Full course description
Explore how to manage digital identity and restrict access to files. We will examine methods for authentication, including evaluating strengths and weaknesses of these methods,file permissions, and alternate access control schemes.