Loading...

Course Description

Vulnerable systems are made secure by employing enforcement mechanisms. Beyond enforcement mechanisms for authentication and for authorization, this course will explore the use of mechanisms for protecting the integrity of systems and, thus, preventing an attacker from circumventing controls. You will learn about the three primary classes of enforcement mechanisms — mediation/monitoring, isolation, and asymmetry — and discuss how they are deployed in systems today.

It is recommended to only take this course if you have completed “Systems Security,” “Authenticating Machines,” “Authenticating Humans,” “Discretionary Access Control,” and “Mandatory Access Control,” or have equivalent experience.

Faculty Author

Fred Schneider

Benefits to the Learner

  • Evaluate the trade-offs among different approaches to mediation
  • Identify whether a policy can be enforced with monitoring
  • Interpret how existing systems and architectures instantiate mediation and isolation
  • Determine when policy intervention is an appropriate enforcement strategy

Target Audience

  • IT professionals
  • Developers
  • Programmers
  • Analysts
  • Software engineers
  • Cybersecurity professionals

Accrediting Associations

Applies Towards the Following Certificates

Loading...
Enroll Now - Select a section to enroll in
Type
self-paced (non-instructor led)
Dates
Jan 12, 2022 to Dec 31, 2030
Course Fee(s)
Regular Price $1,199.00
Section Notes

IMPORTANT COURSE INFORMATION

 

?     We strongly recommend you take and complete the courses in this certificate program in sequential order.

Type
3 week
Dates
Oct 29, 2025 to Nov 18, 2025
Total Number of Hours
24.0
Course Fee(s)
Regular Price $1,199.00
Section Notes

IMPORTANT COURSE INFORMATION

 

We strongly recommend you take and complete the courses in this certificate program in sequential order.

Type
3 week
Dates
Dec 10, 2025 to Dec 30, 2025
Total Number of Hours
24.0
Course Fee(s)
Regular Price $1,199.00
Section Notes

IMPORTANT COURSE INFORMATION

 

We strongly recommend you take and complete the courses in this certificate program in sequential order.

Required fields are indicated by .