In the third week of this course, we'll learn about the "three A's" in cybersecurity. No matter what type of tech role you're in, it's important to understand how authentication, authorization, and accounting work within an organization. By the end of this module, you'll be able to choose the most appropriate method of authentication, authorization, and level of access granted for users in an organization.
- Identify and describe the most common authentication services.
- Understand and be able to choose the most appropriate method of authentication or authorization.
- Be able to grant the appropriate level of access for the users of an organization.