Authentication and Access Control - Course Outline (Updated)
Authentication and Access Control - Course Outline (Updated)
(Adv. diploma)
Course Title: Authentication and Access Control Course Code:
Course Description:
This course introduces students to the concepts of authentication and access control, their
components, processes, and structures, as well as the policies, standards and guidelines required to
implement them. As user identification, authentication and proper authorization are essential in
developing, maintaining and implementing a framework for information system security, this course
also immerses students with real-life cases so that they can explore how authentication and access
control protect IT resources from unauthorized use and serve as primary means to ensure
information and data privacy.
Course Objectives:
The objectives of this course are the following:
Course Prerequisites(s):
Introduction to Cryptography
Windows and Linux System Administration
1. Scholastic rigor and technical competence, such as: problem solving, critical and analytical
thinking;
2. Discipline and accountability, such as: working independently, responsibility and
authenticity;
3. Innovation, such as: imagination and solution integration; and
4. Lifelong learning, such as: inquisitiveness and adaptability.
Learning Outcomes:
1. Obtain a strong grasp of the difference among authorization, authentication, and access control;
2. Differentiate the different stages of authentication process employed in various information
systems;
3. Explain the different elements of access control used in various implementations;
4. Evaluate authentication and access control mechanisms used in information systems;
5. Evaluate breaches to authentication and access control mechanisms and processes;
6. Implement basic authentication and access control systems.
Course Outline: Authentication and Access Control
Course Working Plan:
Assessment
Week
Lectures/Contents Ref. Practical / Lab
#
Introduction to Authentication
● Importance of
Authentication Manage Group Policy Objects
Week 2
Text1, Ch1 /
● Authentication Factors Text2, Ch3
in Active Directory
◦ Something You Know
◦ Something You Have
◦ Something You Are
Text1, Ch2 /
● Value, Situation and Text2, Ch3
Liability
● Utility of Multi-layered
Access Control System
Unauthorized Access and Security
Breaches
Configure Windows Firewall
● Deterring Information
Quiz No.1
Including Testing IIS Connectivity, Creating
Week 4
Text1, Ch5 /
Theft
Text2, Firewall Rules and Allowing Apps through the
● Access Control Failures: Ch1&3 Firewall Control Panel
People, Technology
● Security Breaches: Types
and Implications
Text1, Ch8 /
Systems, Executables Text2, Ch2 Encrypt and Decrypt Web Traffic with HTTPS
● Best Practices for Access
Controls for Information
Systems
Mid-Exam
Manage Linux Accounts -
Week 7
Text1, Ch9 /
● Electronic Key Text3, Ch7 and
Management System Packet Tracer Lab: Smart Home
● Fobs and Tokens
● Common Access Cards
Text1,
Packet Tracer Lab:
● Mandatory Access Control Ch10 /
Text3, Ch2 Context-based Access Control
● Role-based Access Control
● Attribute-based Access
Control
Authentication Factors
● Types of Factors
◦ Something You Know
◦ Something You Have
◦ Something You Are
Quiz No.2
Week 10
● Encryption and Text3, Ch2 / Encrypting and Decrypting Files using PKI
Cryptography Text1, Ch13
● Certificate Authorities
Testing Access Control
Systems
Week 14 & 15
Practical Test
Project Presentation & Course Review
Students Workload:
Facility Required:
● Laboratory PCs with Wi-Fi access
● Firewall Appliance
● Authentication Devices such as YubiKey
● Windows and Linux Server Operating System
● Oracle Virtual Box or VMWare Workstation
Course Outline: Authentication and Access Control
● Packet Tracer 8.0.1
● Encryption, Decryption and Digital Signature Tools (preferably open-source)
● Kerberos Client in Linux / Kerberos Authentication
● Universal 2nd Factor (U2F) Authentication Tool (such as FIDO)
Text Books:
S# Title Author Publisher Edition
Access Control, Authentication, and
Public Key Infrastructure
Jones & Bartlett
Chapple, M., Ballad, B., Ballad, T., 2nd
Text1 (https://www.amazon.com/ Learning. ISBN:
Banks, E. (2013) Edition
Authentication-Infrastructure-Bartlett- 9781284031607
Learning-Information/dp/1284031594)
Plagiarism Policy:
Acts of Plagiarism whether intentional or unintentional are not tolerated and you are strongly urged to refer to
UTAS Policy 006 (CAS) and its Procedures for details on the consequences of plagiarism within the UTAS
system.