Course Highlights
  • Certificate of completion
  • 8 weeks duration
  • 15 to 20 weekly study hours
  • Video lectures
  • Case studies
  • Assignments and projects
  • Expert MIT faculty


Curriculum

1 Topic
Gain an overview of cybersecurity risk management and discuss its three facets: protect; detect; and respond.

1 Topic
Explore basic concepts; design; and architecture of computer security systems and their operation.

1 Topic
Review and gain an understanding of the multiple laws that regulate cybersecurity and the different levels of protection they provide.

1 Topic
Explore the cyber threat landscape; identify the types of threats and vulnerabilities; and understand how they can affect businesses and people's everyday lives.

1 Topic
Analyze the federal government's responses to cyberattacks in cities.

1 Topic
Identify and analyze fundamental principles and concepts of IAM and best practices for identification; authentication; and authorization to allow access to computer systems and data resources.

1 Topic
Gain deeper knowledge of IAM best practices by exploring perspectives on administration and technology; layers and practices; the benefits of single sign-on; and federated identity management.

1 Topic
Become familiar with the various job responsibilities of an IAM analyst.

  Write a Review

Cybersecurity: Identity and Access Management

Go to Paid Course