|Category||Information Technology & Computers|
|Description||Authentication focuses on the act of confirming the truth of an attribute of a single piece of data or entity.
As such, you will examine positive user identification coupled with access control and audit capabilities that provide fine-grained control over access to networks, hosts and individual applications. Also included in the course is a review of the different technologies used in token authentication schemes and the practical applications found for each. Because the use of cryptographic authentication techniques is also growing, this technology is discussed with a review of public key infrastructure.
During your time in the Authentication course you will complete hands-on assignments such as creating a centralized certificate authority and creating a VPN.
After you successfully complete this course you will be able to:
• Discuss multi-factor authentication;
• Demonstrate attacks on biometric authentication systems;
• Refute claims of non-repudiation;
• Discuss the risks of relying on third parties for authentication and key management;
• Understand the risks of secret algorithms and the importance of peer review;
• Prove authenticity and integrity cryptographically;
• Implement cryptographically secure communications;
• Implement a corporate key management system.
|Section||Cost||Semester||Start Date||End Date||Meeting Times||Campus|
|Legend for Days
M - Monday T - Tuesday W - Wednesday R - Thursday F - Friday S - Saturday U - Sunday
TBA - To Be Announced