Authentication and Access Control Course Description V2
Authentication and Access Control Course Description V2
Course Information
Course This course introduces students to the concepts of authentication and access control,
Goals / their components, processes, and structures, as well as the policies, standards, and
Description guidelines required to implement them. As user identification, authentication, and proper
authorization are essential in developing, maintaining, and implementing a framework
for information system security, this course also immerses students with real-life cases
so that they can explore how authentication and access control protect IT resources from
unauthorized use and serve as primary means to ensure information and data privacy.
Course Objectives
This course should enable the students to:
1. To identify authentication information for information technology and systems
2. To describe access control for information technology and systems
3. To analyze the different stages of the authentication procedure
4. To identify the different elements of access control
5. To define unauthorized access and authentication breaches
6. To identify access control solutions
7. To implement authentication and access control systems
Laboratory PCs with W-Fi access Windows and Linux Server Operating System
Firewall Appliance Oracle Virtual Box / VMWare Workstation
Authentication Devices such as YubiKey Packet Tracer 8.0.1
Open Source Encryption, Decryption, and Digital
Signature Tools
Kerberos Client (Linux) / Kerberos Authentication
U2F Authentication Tool
Learning Resources
Books Useful links
Access Control, Authentication, and Public Key Infrastructure, 2nd Edition FIDO Alliance (fidoalliance.org)
Chapple, M., Ballad, B., Ballad, T., Banks, E. (2013). Jones & Bartlett
Learning. ISBN: 9781284031607
3|Page