Authentication, Certificates and Tokens
|Lecture hours per week|
|Lab hours per week|
Positive user identification, coupled with access control and audit capabilities provide a fine degree of control over access to networks, hosts and individual applications. This course reviews the different technologies used in token authentication schemes, and the practical applications found for each. The use of digital certificates for user authentication is also growing, and this technology is discussed, together with a review of Certificate Authority products. The discussion on digital certificates will include an overview of cryptography without the complexities of the underlying math.