CSS 346: Access Controls, Authentication and Public Key Infrastructure (PKI)

Course Description

This course will focus on the concept of access control to information systems. Applications, authentication, and accounting for end users and system administrators will be covered. In addition, security controls for access control including tokens, biometrics, and use of public key infrastructures (PKI) will be covered. (3 credits)

Prerequisites

  • ENG 101: English Composition 1
  • ENG 102: English Composition 2
  • ITE 145: Fundamentals of Information Systems Security
  • ITE 220: Networking and Data Communication (Recommended)

Student Learning Outcomes (SLOs)

Students who successfully complete this course will be able to:

  1. Define access control and identity management concepts.
  2. Analyze how an information classification standard impacts an IT infrastructure’s access control requirements and implementation.
  3. Define proper security controls and techniques to mitigate risks and threats in an IT infrastructure.
  4. Design appropriate authentication solutions throughout an IT infrastructure.
  5. Implement appropriate access controls and identity management techniques within IT infrastructures.
  6. Implement a secure remote access solution.
  7. Implement PKI and encryption solutions to ensure the confidentiality of business communications.
  8. Mitigate risk from unauthorized access to IT systems through proper testing and monitoring.
  9. Develop an access control policy framework consisting of best practices for policies, standards, procedures, and guidelines to mitigate unauthorized access.
  10. Assess the consequences of failed access controls and mitigate unauthorized access.

Course Activities and Grading

AssignmentsWeight

Discussions

10%

Written Assignments

20%

Lab Assignments

20%

Quizzes

10%

Project (Four Parts)

20%

Final Exam

20%

Total

100%

Required Textbooks

Available through Charter Oak State College's online bookstore

  • Chapple, Mike, Bill Ballad, and Tricia Ballad. Access Control, Authentication, and PKI - Bundle for LMS Integrations. 3rd. ed., Sudbury, MA: Jones & Bartlett, 2021. ISBN-13: 978-1-284-21479-6
    • Note: This is a bundle which includes the textbook and the Access Code required for this course. We discourage students from purchasing “used” materials from other sources due to access codes not working properly.

 

Course Schedule

WeekSLOsReadings and ExercisesAssignments

1

1,2

Topics: Access Control Framework and Business Drivers

  • Readings:
    • Chapter 1: Access Control Framework
    • Chapter 2: Business Drivers for Access Controls
  • Read assigned chapters
  • Participate in the Discussions 1 and 2
  • Review the Lecture material
  • Submit Assignment:  Implementation of an Information Classification Policy

2

3

Topic: Developing an Access Control Policy Framework

  • Readings:
    • Chapter 3: Human Nature and Organizational Behavior
    • Chapter 4: Assessing Risk and Its Impact on Access Control
  • Read assigned chapters
  • Participate in the Discussions 3 and 4
  • Review the Lecture material
  • Submit Assignment: Project Part 1 - Infrastructure Assessment and Risk Assessment
  • Complete Lab: Designing an Access Control System
  • Complete Lab: Conducting a Risk Assessment of an Access Control System
  • Complete Quiz 1

3

4,5

Topics: Access Control in the Enterprise and Business Challenges

  • Readings:
    • Chapter 5: Access Control in the Enterprise
    • Chapter 6: Mapping Business Challenges to Access Control Types
  • Read assigned chapters
  • Participate in the Discussion 5, 6
  • Review the Lecture material
  • Submit Assignment: Achieving Zero Trust
  • Complete Lab: Configuring an Active Directory Domain Controller
  • Complete Quiz 2

4

5

Topic: Access Control Implementations

  • Readings:
    • Chapter 7: Access Control System Implementations
    • Chapter 8: Access Control for Information Systems
  • Read assigned chapter
  • Review the Lecture material
  • Participate in the Discussion 7
  • Submit Assignment: Developing Access Control Strategies for Data and File Systems
  • Submit Assignment: Project Part 2 - Role-Based Access Control (RBAC) and Single Sign-On (SSO)
  • Complete Lab: Managing Windows Accounts and Organizational Units
  • Complete Lab: Configuring Windows File System Permissions

5

5,6

Topics: Physical Security and Remote Access

  • Readings:
    • Chapter 9: Physical Security and Access Control
    • Chapter 10: Access Control Solutions for Remote Workers
  • Read assigned chapters
  • Review the Lecture material
  • Participate in the Discussion 8, 9
  • Submit Assignment - Project Part 3: Remote Access and Physical Security
  • Complete Lab: Configuring a Remote Access VPN
  • Complete Quiz 3

6

7

Topic: Public Key Infrastructure and Encryption

  • Readings:
    • Chapter 11:

      Public Key Infrastructure and Encryption

  • Read assigned chapters
  • Participate in the Discussion 10
  • Review the Lecture material
  • Complete Lab: Encrypting and Decrypting Files with PKI
  • Complete Quiz 4

7

8

Topics: Testing Access Control Systems and Access Control Assurance

  • Readings:
    • Chapter 12: Testing Access Control Systems
    • Chapter 13: Access Control Assurance
  • Read assigned chapter
  • Review the Lecture material
  • Participate in the Discussion 11, 12
  • Submit Assignment: Scope of Work for Penetration Test
  • Submit Assignment: Project Part 4 - Testing and Monitoring
  • Complete Lab: Scanning an Active Directory Domain Controller for Vulnerabilities
  • Complete Lab: Scope of Work for Penetration Test

8

9,10

Topics: Access Control Laws, Policies, Standards and Security Breaches

  • Readings:
    • Chapter 14: Access Control Laws, Policies and Standards
    • Chapter 15: Security Breaches and the Law

 

  • Read assigned chapter
  • Review the Lecture material
  • Participate in the Discussion 13
  • Complete Lab: Applying the Security Policy Framework to an Access Control Environment
  • Complete Final Exam
  • Complete the Course Evaluation

 

COSC Accessibility Statement

Charter Oak State College encourages students with disabilities, including non-visible disabilities such as chronic diseases, learning disabilities, head injury, attention deficit/hyperactive disorder, or psychiatric disabilities, to discuss appropriate accommodations with the Office of Accessibility Services at OAS@charteroak.edu.

COSC Policies, Course Policies, Academic Support Services and Resources

Students are responsible for knowing all Charter Oak State College (COSC) institutional policies, course-specific policies, procedures, and available academic support services and resources. Please see COSC Policies for COSC institutional policies, and see also specific policies related to this course. See COSC Resources for information regarding available academic support services and resources.