Coursera
Coursera Logo

Risk Management: Use of Access Controls to Protect Assets 

  • Offered byCoursera
  • Public/Government Institute

Risk Management: Use of Access Controls to Protect Assets
 at 
Coursera 
Overview

Duration

6 hours

Total fee

Free

Mode of learning

Online

Difficulty level

Beginner

Official Website

Explore Free Course External Link Icon

Credential

Certificate

Risk Management: Use of Access Controls to Protect Assets
Table of content
Accordion Icon V3
  • Overview
  • Highlights
  • Course Details
  • Curriculum

Risk Management: Use of Access Controls to Protect Assets
 at 
Coursera 
Highlights

  • Earn a Certificate upon completion
Details Icon

Risk Management: Use of Access Controls to Protect Assets
 at 
Coursera 
Course details

Skills you will learn
More about this course
  • In this course, we will focus on understanding risk management options and the use of access controls to protect assets
  • We will start by examining the basic steps that must be in place to develop a security culture within the organization and impacting policies
  • We will also look into how to write and use them to enforce security requirements
  • Then we will move on to the actual business of controlling how our systems, services, resources, and data can be accessed safely by authorized persons
  • We will also cover access control models like MAC, DAC, RBAC, and conclude the chapter with an examination of both LAN and WAN identity management

Risk Management: Use of Access Controls to Protect Assets
 at 
Coursera 
Curriculum

Module 1: Document, Implement, and Maintain Functional Security Controls

Welcome

Module 1 Overview

Applied Scenario 1 Review: Governance and Policies

Activity 1: Password Policy

Knowledge Check: Document, Implement, and Maintain Functional Controls

Access Control Fundamental Concepts

The Data Security Lifecycle

System Models: Biba and Bell-LaPadula

Applied Scenario 2: Access Controls

Knowledge Check: Access Control Model

Module 3: Identity Management Lifecycle

Types of Tokens

Biometric Data Security Standards

Knowledge Check: Certificates and Tokens

Activity 2: Biometric Identification

Case Study: Biometrics Data Transmission

Knowledge Check: Identity Management Maintenance

Knowledge Check: Privileged Access and Associated Risks

Knowledge Check: Identity Management

Knowledge Check: Identity Management Lifecycle

Module 4 Overview

Decentralized Access Control Management

Third-Party Connections

Identity as a Service (IDaaS)

Knowledge Check: Access Configuration

Knowledge Check: Authentication Methods

Module 5: Chapter 2 Review

Terms and Definitions

Chapter 2 Quiz: Understanding Risk Management Options and the Use of Access Controls to Protect Assets

Other courses offered by Coursera

– / –
3 months
Beginner
– / –
20 hours
Beginner
– / –
2 months
Beginner
– / –
3 months
Beginner
View Other 6726 CoursesRight Arrow Icon
qna

Risk Management: Use of Access Controls to Protect Assets
 at 
Coursera 

Student Forum

chatAnything you would want to ask experts?
Write here...