0% found this document useful (0 votes)
49 views

Authentication and Access Control Course Description V2

This 3-credit advanced diploma course introduces authentication and access control concepts. It has prerequisites in cryptography and system administration. The course goals are to understand authentication components and processes, access control policies, and real-life implementation cases. Objectives include identifying authentication information, access control elements, and unauthorized access. Learning outcomes involve understanding, analyzing, evaluating, and applying authentication and access control mechanisms. Required resources include PCs, servers, firewalls, and authentication devices. Assessments include quizzes, labs, exams, projects, and practical tests evaluating students' grasp of the concepts.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
49 views

Authentication and Access Control Course Description V2

This 3-credit advanced diploma course introduces authentication and access control concepts. It has prerequisites in cryptography and system administration. The course goals are to understand authentication components and processes, access control policies, and real-life implementation cases. Objectives include identifying authentication information, access control elements, and unauthorized access. Learning outcomes involve understanding, analyzing, evaluating, and applying authentication and access control mechanisms. Required resources include PCs, servers, firewalls, and authentication devices. Assessments include quizzes, labs, exams, projects, and practical tests evaluating students' grasp of the concepts.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 3

University of Technology and Applied Sciences

Course Code: Course Name: Authentication and Level: Advanced Diploma


Access Control
Pre-requisites: Course type: Passing Grade / Mark:
- Intro to Cryptography
- Windows/Linux System
Administration
Credit Hours: 3 Theory Contact Hours: 2 Practical Contact Hours: 2

Course Information
Course This course introduces students to the concepts of authentication and access control,
Goals / their components, processes, and structures, as well as the policies, standards, and
Description guidelines required to implement them. As user identification, authentication, and proper
authorization are essential in developing, maintaining, and implementing a framework
for information system security, this course also immerses students with real-life cases
so that they can explore how authentication and access control protect IT resources from
unauthorized use and serve as primary means to ensure information and data privacy.

Course Objectives
This course should enable the students to:
1. To identify authentication information for information technology and systems
2. To describe access control for information technology and systems
3. To analyze the different stages of the authentication procedure
4. To identify the different elements of access control
5. To define unauthorized access and authentication breaches
6. To identify access control solutions
7. To implement authentication and access control systems

Learning Outcomes LOTs HOTs

S# By the end of the course, students should be able to:

1. Obtain a strong grasp of the difference among authorization,


UNDERSTANDING
authentication, and access control;
2. Differentiate the different stages of the authentication process
ANALYZING
employed in various information systems;
3. Explain the different elements of access control used in various
ANALYZING
implementations;
4. Evaluate authentication and access control mechanisms used in EVALUATING
1|Page
information systems;
5. Evaluate breaches to authentication and access control
EVALUATING
mechanisms and processes;
6. Implement basic authentication and access control systems. APPLYING

Facilities and Resources Required


Hardware requirements Software requirements

Laboratory PCs with W-Fi access Windows and Linux Server Operating System
Firewall Appliance Oracle Virtual Box / VMWare Workstation
Authentication Devices such as YubiKey Packet Tracer 8.0.1
Open Source Encryption, Decryption, and Digital
Signature Tools
Kerberos Client (Linux) / Kerberos Authentication
U2F Authentication Tool

Learning Resources
Books Useful links

Access Control, Authentication, and Public Key Infrastructure, 2nd Edition FIDO Alliance (fidoalliance.org)
Chapple, M., Ballad, B., Ballad, T., Banks, E. (2013). Jones & Bartlett
Learning. ISBN: 9781284031607

Mechanics of User Identification and Authentication: Fundamentals of


Identity Management, 1st Edition
Todorov, Dobromir (2007). Auerbach Publications / Routledge Taylor &
Francis Group ISBN-13: 9781420052190

Authentication and Access Control: Practical Cryptography Methods and


Tools, 1st Edition
Boonkrong, Sirapat (2021). Apress Publishing ISBN: 9781484265703

Security in Computing, 5th Edition


Pfleeger, S.L., Pfleeger, C., Margulies, J. (2015). Pearson. ISBN:
9780134085074

Computer Security: Principles and Practice, 4th Edition


Stallings, W., Brown, L. (2017). Pearson. ISBN-10: 9780134794105

Type and Level of Assessment in Examination


2|Page
Assessment Methods LO #1 LO #2 LO #3 LO #4 LO #5 LO #6
Quiz 1 √ √ √
Quiz 2 √ √
Laboratory Work √ √ √
Mid-Term Examination √ √ √ √
Mini Project √ √ √
Practical Test √ √
Final Examination √ √ √ √ √

3|Page

You might also like