provide a reflection of at least 500 words or 2 pages double spaced of how the knowledge skills or theories of this course have been applied or could be applied in a practical manner to your current work environment 4
Subject Name : Access Control ,Text Book: (Access Control, Authentication, and Public Key Infrastructure, Second Edition. Jones & Bartlett Learning)
Provide a 500 word (or 2 pages double spaced) minimum reflection.Use of proper APA formatting and citations. If supporting evidence from outside resources is used those must be properly cited.Share a personal connection that identifies specific knowledge and theories from this course.Demonstrate a connection to your current work environment. If you are not employed, demonstrate a connection to your desired work environment.The assignment asks that you reflect how the knowledge and skills obtained through meeting course objectives were applied or could be applied in the workplace.
Field of Study : Computer Science
Working Environment : Consider as a Linux Administrator .
Week |
Topic |
Assignments |
1 |
Lesson 1 – Access Control Framework Lesson 2 – Assessing Risk and Its Impact on Access Control Chapter 1 Chapter 2 |
Lab 1: Configuring an Active Directory Domain Controller; Lab 2: Managing Windows Accounts and Organizational Units; Lab 1 & 2 Quizzes |
2 |
Lesson 3 – Business Drivers for Access Control Lesson 4 – Access Control Policies, Standards, Procedures and Guidelines Chapter 3 Chapter 4 |
Lab 3: Configuring Windows File System Permissions; Lab 4: Managing Group Policy Objects in Active Directory; Lab 3 & 4 Quizzes |
3 |
Lesson 5 – Security Breaches and the Law Lesson 6 – Mapping Business Challenges to Access Control Types Chapter 5 Chapter 6 |
Lab 5: Configuring Windows Firewall; Lab 6: Managing Linux Accounts; Lab 5 & 6 Quizzes |
4 |
Lesson 7 – Human Nature and Organizational Behavior Lesson 8 – Access Control for Information Systems Chapter 7 Chapter 8 |
|
5 |
Lesson 9 – Physical Security and Access Control Lesson 10 – Access Control in the Enterprise Chapter 9 Chapter 10 |
Lab 7: Configuring Linux File System Permissions; Lab 7 Quiz |
6 |
Lesson 11 – Access Control System Implementations Lesson 12 – Access Control Solutions for Remote Workers Chapter 11 Chapter 12 |
Lecture |
7 |
Lesson 13 – Public Key Infrastructure and Encryption Lesson 14 – Testing Access Control Systems; Access Control Security Models Chapter 13 Chapter 14 |
Lab 8: Encrypting and Decrypting Files with PKI; Lab 9: Authenticating Security Communications with Digital Signatures; Lab 8 & 9 Quizzes |
8 |