Mile2 Cybersecurity Certifications

Cybersecurity Certifications

Reply To: OCU ISCAP A Week 01 Lesson 03 Discussion

Aaron Elliott

Identity management, authentication techniques, single sign on, and access control monitoring all are used in protecting a network from unauthorized users from gaining access to a network, along with assigning a unique identifier to users that is used to authorize access privileges. The mentioned terms strengthen authentication of user access to a network more than just username and password, using something the user would only know or be assigned like an authenticator, along with monitoring of user activity if any unauthorized users slip by.


Please Note:

The support ticket system is for technical questions and post-sale issues.


If you have pre-sale questions please use our chat feature or email .