Skip main navigation

Hurry, only 11 days left to get one year of Unlimited learning for £249.99 £174.99. New subscribers only. T&Cs apply

Find out more

What to Expect in Week 2

Learn about the role of identification and authentication as key concepts in identity and access management.
Businessman using face recognition outdoors

In the coming week, we will cover two main topics:

  • identification
  • authentication

Week 1: What is identity and access management? Governance part 1 and part 2. Week 2: Key concepts identification. Key concepts authentication. Biometric authentication. Week 3: Key authorization part 1 and part 2. Week 4: Organizational processes part 1 and part 2.

By the end of this week, you will be able to:

  • describe the key concept ‘identification’
  • explain how identification is used in identity and access management
  • describe the key concept ‘authentication’
  • explain how authentication is used in identity and access management
This article is from the free online

Cyber Security Foundations: Identity and Access Management

Created by
FutureLearn - Learning For Life

Reach your personal and professional goals

Unlock access to hundreds of expert online courses and degrees from top universities and educators to gain accredited qualifications and professional CV-building certificates.

Join over 18 million learners to launch, switch or build upon your career, all at your own pace, across a wide range of topic areas.

Start Learning now