Read our cookies policy and privacy statement for more information.
×Las Vegas, Nevada
Explores the concept of controlling access to information systems and applications. Topics include authorization; authentication; accounting for end-users, network devices, system, and administrators; and security controls for access control including tokens and public key infrastructures (PKIs).
Units: 3.0