• Classroom
  • Online, Self-Paced
Course Description

Successful completion of this exam will demonstrate a candidate's ability to understand technical requirements in each of the areas of identity proofing, registration, authenticators, management processes, authentication protocols, federation, and related assertions. They will demonstrate understanding of the policy framework and the core policy elements. The candidate will be able to implement system-level security principles in the design, development, and operation of access management of an information system. The candidate will be able demonstrate their ability to implement security and privacy controls for federal information systems and other organizations.

Learning Objectives

Successful completion of this exam will demonstrate a candidate's ability to understand technical requirements in each of the areas of identity proofing, registration, authenticators, management processes, authentication protocols, federation, and related assertions. They will demonstrate understanding of the policy framework and the core policy elements. The candidate will be able to implement system-level security principles in the design, development, and operation of access management of an information system. The candidate will be able demonstrate their ability to implement security and privacy controls for federal information systems and other organizations.

Framework Connections

The materials within this course focus on the Knowledge Skills and Abilities (KSAs) identified within the Specialty Areas listed below. Click to view Specialty Area details within the interactive National Cybersecurity Workforce Framework.