Access Control, Authentication, and Public Key Infrastructure

Information security analysts

Please contact us for information about prerequisites.

Expected Duration
5 day


This course defines the components of access control, provides a business framework for implementation, and discusses legal requirements that impact access control programs. It looks at the risks, threats, and vulnerabilities prevalent in information systems and IT infrastructures and how to handle them. It provides learners a professional resource detailing how to put access control systems to work in addition to how to test and manage them.

In addition to premium instructional content from Jones & Bartlett Learning’s comprehensive Information Systems Security and Assurance (ISSA) curriculum, this course provides access to a customized “virtual sandbox” learning environment that aggregates an unparalleled spectrum of cybersecurity applications. Providing instant, unscheduled access to labs from the convenience of a web-browser, this course allows you to practice “white hat” hacking on a real IT infrastructurethese are not simulations. Winner of the “Security Training and Educational Programs” top prize at the prestigious 2013 Global Excellence Awards by Info Security Products Guide, the industry’s leading information security research and advisory guide, these labs provide valuable exposure to complex, real world challenges and over20 hours of training exercises on how hackers and perpetrators use these applications and tools.


This course covers content within the following industry certification exams:

  • System Security Certified Practitioner (SSCP) – two content domains covered
  • Certified Information Systems Security Professional (CISSP) – four content domains covered
  • Security + – one content domain covered
  • National Institute of Standards and Technology (NIST) – five content domains covered
  • 8570.01 – two content domains covered


1. The Need for Access Control Systems

  • Access Control Framework
  • Assessing Risk and Its Impact on Access Control
  • Business Drivers for Access Controls
  • Access Controls Law, Policies, and Standards
  • Security Breaches and the Law

2. Mitigating Risk with Access Control Systems, Authentication, and PKI

  • Mapping Business Challenges to Access Control Types
  • Human Nature and Organizational Behavior
  • Access Control for Information Systems
  • Physical Security and Access Control
  • Access Control in the Enterprise

3. Implementing, Testing, and Managing Access Control Systems

  • Access Control System Implementations
  • Access Control Solutions for Remote Workers
  • Public Key Infrastructure and Encryption
  • Testing Access Control Systems
  • Access Control Assurance



Select Course Options