Biometric security is on the rise as younger generations and mobile users have become comfortable using tools such as fingerprint identification for access.  Biometrics have the benefit of non-repudiation and ease of use.  The question being, where is biometrics place in corporate security programs?

This course compares and contrasts various types of security including biometrics, passwords, tokens and security cards. We delve into understanding the levels of security, ease of use and cost of implementation. Lastly, we discuss the associated benefits and risks of each methodology.

 

Learning Objectives
  • Explore key definitions related to corporate security methodologies
  • Recognize the differences between levels of security offered by various security methodologies
  • Explore the implementation cost of various security methodologies
  • Explore the ease of use associated with various security methodologies
Last updated/reviewed: August 19, 2023
4 Reviews (18 ratings)

Reviews

4
Anonymous Author
Stated prerequisite requirements were appropriate and sufficient. Please review questions and re-word them appropriately.

5
Anonymous Author
I found this course to be extremely useful and helpful. The instructor was through and very clear and easy to follow.

4
Anonymous Author
Very brief and to the point. Just focused enough to where I was not overwhelmed with information.

4
Anonymous Author
This course provides a basic understanding of various corporate security methodologies.

Prerequisites
Course Complexity: Intermediate

No advanced preparation or prerequisites are required for this course.

Education Provider Information
Company: Illumeo, Inc., 75 East Santa Clara St., Suite 1215, San Jose, CA 95113
Contact: For more information regarding this course, including complaint and cancellation policies, please contact our offices at (408) 400- 3993 or send an e-mail to .
Instructor for this course
Course Syllabus
INTRODUCTION AND OVERVIEW
  Introduction to Comparing Corporate Security Methodologies12:05
  Levels of Security - Biometrics15:19
  Levels of Security - Passwords12:59
  How Companies are Using Biometric Security12:03
CONTINUOUS PLAY
  Comparing Corporate Security Methodologies 51:47
Supporting Materials
  Slides: Comparing Corporate Security MethodologiesPDF
  Comparing Corporate Security Methodologies Glossary/IndexPDF
REVIEW AND TEST
  REVIEW QUESTIONSquiz
 FINAL EXAMexam