Access Control and Security Architecture Design
In this course youll learn about designing a secure access control architecture and updating a security architecture. First youll explore identity and access management including the IAAA process and related entities. Youll move on to examine access control policies and models. Youll learn about centralized access control as well as distributed access control federated identity management frameworks and supporting protocols. Youll explore the importance of access reviews as well as access control considerations with bring your own device and Internet of Things. Next youll examine the impact of change on a security architecture and steps involved in life cycle management. Finally youll complete this course by learning about architecture change considerations and the importance of a change management policy.