Instructor for this course
more

Biometric security is on the rise as younger generations and mobile users have become comfortable using tools such as fingerprint identification for access.  Biometrics have the benefit of non-repudiation and ease of use.  The question being, where is biometrics place in corporate security programs?

This course compares and contrasts various types of security including biometrics, passwords, tokens and security cards. We delve into understanding the levels of security, ease of use and cost of implementation. Lastly, we discuss the associated benefits and risks of each methodology.

 

Learning Objectives

  • Explore key definitions related to corporate security methodologies
  • Recognize the differences between levels of security offered by various security methodologies
  • Explore the implementation cost of various security methodologies
  • Explore the ease of use associated with various security methodologies
Last updated/reviewed: November 27, 2019

2 Reviews (9 ratings)Reviews

5
Anonymous Author
I found this course to be extremely useful and helpful. The instructor was through and very clear and easy to follow.
4
Anonymous Author
Very brief and to the point. Just focused enough to where I was not overwhelmed with information.

Prerequisites

Course Complexity: Intermediate

No advanced preparation or prerequisites are required for this course.

Education Provider Information

Company:
Illumeo, Inc., 75 East Santa Clara St., Suite 1215, San Jose, CA 95113
Contact:
For more information regarding this course, including complaint and cancellation policies, please contact our offices at (408) 400- 3993 or send an e-mail to .
Course Syllabus
INTRODUCTION AND OVERVIEW
  12:05Introduction to Comparing Corporate Security Methodologies
  15:20Levels of Security - Biometrics
  12:59Levels of Security - Passwords
  12:03How Companies are Using Biometric Security
CONTINUOUS PLAY
  51:51Comparing Corporate Security Methodologies
Supporting Materials
  PDFSlides: Comparing Corporate Security Methodologies
  PDFComparing Corporate Security Methodologies Glossary/Index
REVIEW AND TEST
  quizREVIEW QUESTIONS
 examFINAL EXAM