Overview

The use of access mechanisms and deployment of selected levels of privilege is critical in providing secure access to network and application processes.  Access control is how limits on users or systems are implemented, and is one of the three cornerstones of security (confidentiality, integrity and authentication).  Although in principal … For more content click the Read More button below.   The course includes working with the following technologies:   ·        Active directory and server configurations ·        Domain controller and Kerberos ·        RADIUS authentication ·        RSA authentication engine ·        Multi-factor and token access control   ·        Cryptographic front ends to domain controller and clients

Course Outline

To access course outline please visit below link (Please note that access to UNSW Canberra course outlines requires VPN):

Pre-2019 Handbook Editions

Access past handbook editions (2018 and prior)