This course provides essential guidance to information system managers, designers and program managers on implementing specific account management security controls at the hardware and software level to facilitate compliance with applicable regulatory requirements.
On successful completion of this course, learners should have the knowledge and skills to:
- Control network access
- Apply the principle of separation of duties
- Apply the principle of segregation of resources
- Monitor system access
- Use digital certificates for authentication