Describe authentication and authorization in cybersecurity

Business Owner
Business User
Microsoft 365

Secure authentication and authorization are a cornerstone of protecting against cybersecurity threats. Learn about common identity-based attacks, different authentication methods, and ways to protect against unauthorized access.

Learning objectives

After completing this module, you will be able to:

  • Define authentication
  • Describe common authentication-based attacks
  • Describe authorization security techniques