|
|
ITS 4210 - Access Control, Authentication, and PKI
Lesson
1: Chapter 1, Access Control Framework
Lesson
2: Chapter 2, Assessing Risk and Its Impact on Access Control
Lesson
3: Chapter 3, Business Drivers for Access Controls
Lesson
4: Chapter 4, Access Control Policies, Standards, Procedures, and
Guidelines
Lesson
5: Chapter 5, Security Breaches and the Law
Lesson
6: Chapter 6, Mapping Business Challenges to Access Control Types
Lesson
7: Chapter 7, Human Nature and Organizational Behavior
Review
for the midterm exam
Lesson
8: Chapter 8, Access Control for Information Systems
Lesson
9: Chapter 9, Physical Security and Access Control
Lesson
10: Chapter 10, Access Control in the Enterprise
Lesson
11: Chapter 11, Access Control System Implementations
Lesson
12: Discussion of the Term Project
Lesson
13: Chapter 13, Public Key Infrastructure and Encryption
Lesson 14: Chapter 14, Testing Access Control Systems
Lesson
15: Chapter 15, Access Control Assurance
Review
for the final exam
Other useful web sites:
CompTIA Security+ page
Dept of Homeland Security,
Cybersecurity
page
US-CERT Cyber Security Tips
Krebs on Security
One Look - a great site for looking up any word
What Is...? - great for looking up technical terms
MalwareBytes - a fine product for
scanning for obstinate viruses
Steve Vincent
skvincent@gmail.com
Copyright © 2019 Steve Vincent
URL:
http://stevevincent.info/index.html
Legend: Blue Links are unvisited, Burgundy Links are visited.
: lecture
section notes
: lab
section notes
:
assignments, outlines
:
review/study guides
: handouts
: WWW
references
|