Home Link
Quest Grant

For Businesses

Business Services

Helping the Businesses in our Community.

Regional Services

Everything you need to know to grow in Yavapai County.

Grant Assistance

From grant research to writing services.

Data and Analytics

Research for sustainable business growth.

About Yavapai County

Everything you need to know about commerce Yavapai County.

For Employees & Job Seekers

Career Resources

Personalized training, career counseling, scholarships, and more!

Training Courses

Learn new skills and get ready for your next career move.

Job Fairs and Events

Connect with employers through local job fairs and career events.

Hot Jobs

Top Jobs, Occupations, and Skills in Yavapai County

Job Postings Data Trends

Explore the latest data on job opportunities available from local employers


Loading upcoming events...

Training Courses

Training Course Options

See and compare the different course trainings available through the REDC.

Subject Matter Expert

Train employees and businesses in leadership, professional development, communication, and more

Back to all courses

Access Control and Identity Management Scenarios

Self-Paced5 Course Hours | 12 Weeks
View Course
Cybersecurity & CISSP®
Access Control and Identity Management Scenarios


Access control is the restriction of access to a computer system. So how does a cybersecurity professional manage this access control? This course introduces the principles of access controls, beginning with the central modes of information security and continuing through various attacks and defenses. It provides an overview of Identity Management and the resources used on modern-day information systems, including Web and cloud-based ones. This course also features a number of fictional scenarios based on access control and identity management that professionals face in the real-world.


  • PMI PDUs: 5
    • Leadership PDUs: 1
      • Technical PM PDUs: 4
        • IACET CEUs: 0.5
          • HRCI Credits: 5
            • SHRM PDCs: 5


              • Mobile-friendly
              • Audio-enabled
              • Badge and credit-awarding
              • Real-world case studies
              • Fully accessible
              • Games & Flashcards
              • Expert-supported
              • Video content

              learning Outcomes

              • Identify the four types of information access controls
              • Describe different identification methods and technologies
              • Discuss different components of Authentication, Authorization and Accounting
              • Describe common access control models and mechanisms
              • Explain the technologies used in single-sign-on systems
              • Identify common access control attacks and countermeasures
              • Provide appropriate guidance in response to real-world scenarios describing Access Control and Identity management challenges

              related courses

              • Cybersecurity & CISSP®
                Fundamentals of Application Security

                Fundamentals of Application Security

                Self-Paced3 Course Hours | 12 Weeks
              • Cybersecurity & CISSP®
                Identity and Access Management

                Identity and Access Management

                Self-Paced5 Course Hours | 12 Weeks
              • Cybersecurity & CISSP®
                Introduction to Cybersecurity Concepts and Practices

                Introduction to Cybersecurity Concepts and Practices

                Self-Paced5 Course Hours | 12 Weeks
              Home LinkThe REDC is a Division of Yavapai College.Go to yc.edu

              Sign up for the REDC Newsletter

              Stay in touch with the REDC and learn how we are impacting our community!
              Contact Us