Loading...

Course Description

Access control mechanisms ensure that a user is able to read and/or update only certain objects. With discretionary access control, it is the creator of an object who decides which other users should have access. A broad set of mechanisms have been developed to enforce discretionary access control in a computing system. This course will survey the two approaches widely used in these mechanisms: access control lists and capabilities. Through the use of case studies, you will review the pragmatics of implementations in processor hardware, operating systems, and programming languages.

It is recommended to only take this course if you have completed “Systems Security,” “Authenticating Machines,” and “Authenticating Humans,” or have equivalent experience.

Faculty Author

Fred Schneider

Benefits to the Learner

  • Determine whether discretionary access control is appropriate for a given system
  • Categorize given authorization schemes as either access control lists or capabilities lists
  • Design a capability implementation that satisfies particular properties
  • Recognize the challenges of implementing discretionary access control schemes for real-world systems

Target Audience

  • IT professionals
  • Developers
  • Programmers
  • Analysts
  • Software engineers
  • Cybersecurity professionals

Accrediting Associations

Applies Towards the Following Certificates

Loading...
Enroll Now - Select a section to enroll in
Type
3 week
Dates
Oct 29, 2025 to Nov 18, 2025
Total Number of Hours
24.0
Course Fee(s)
Regular Price $1,199.00
Section Notes

IMPORTANT COURSE INFORMATION

 

We strongly recommend you take and complete the courses in this certificate program in sequential order.

Type
3 week
Dates
Dec 10, 2025 to Dec 30, 2025
Total Number of Hours
24.0
Course Fee(s)
Regular Price $1,199.00
Section Notes

IMPORTANT COURSE INFORMATION

 

We strongly recommend you take and complete the courses in this certificate program in sequential order.

Required fields are indicated by .