Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

Coursera

Access & Security Management

Coursera via Coursera

Overview

Google, IBM & Meta Certificates — All 10,000+ Courses at 40% Off
One annual plan covers every course and certificate on Coursera. 40% off for a limited time.
Get Full Access
In this course, you will learn how to manage user permissions, secure content, and maintain governance practices in Confluence environments. You will explore permission models, page restrictions, authentication basics, notification settings, permission management, security controls, and user management. You will work with view and edit rights, page-level access, MFA-related practices, and audit processes that support secure and compliant use of Confluence. You will also examine how permissions can be managed at scale, how security controls support organizational standards, and how user activity and access can be reviewed for compliance needs. The included project-based work will give you experience with security audit and remediation planning. This course focuses on access control, governance, and operational security practices for Confluence in organizational contexts.

Syllabus

  • Manage User Permissions: Permission Fundamentals: View vs. Edit
    • You will develop a clear, decision-ready understanding of view versus edit permissions and where those permissions apply. The emphasis is on avoiding common misunderstandings that lead to over-permissioning or blocked collaboration.
  • Manage User Permissions: Granting Edit Rights Safely at the Page Level
    • You will perform a precise, real-world task: granting edit access on a single page while keeping the space read-only. The lesson emphasizes safe execution and verification.
  • Control Page Access: Why and When to Restrict Page Access
    • In this module, you will understand how to control page access begins with recognizing why restrictions are necessary when they should be applied. You will examine common workplace scenarios to identify valid triggers such as confidential information and work-in-progress content, building the judgment needed before applying access controls.
  • Control Page Access: How to Correctly Configure Page-Level Access
    • In this module, you will learn how to apply page-level access controls in practice helps learners move from decision-making to execution. You will translate policy into action by assigning editor and viewer roles, verifying restrictions, and ensuring pages are shared securely while supporting effective collaboration.
  • Secure Basics & MFA: Foundations of Secure Access
    • This module introduces the foundational role of passwords and multi-factor authentication (MFA) in protecting organizational systems. You will examine why basic credential-based security fails and how MFA meaningfully reduces unauthorized access risk.
  • Secure Basics & MFA: Applying MFA in Practice
    • This module shifts from understanding to action. You will enable MFA on your own account, reflect on usability and adoption challenges, and reinforce secure access as a repeatable habit.
  • Personalize Notifications: Locate and Understand Personal Notification Settings in Confluence
    • In this module, you will identify where personal email-notification settings are located in Confluence and distinguish them from space-level or admin-level controls. This lesson emphasizes on accurate navigation and understanding configuration ownership.
  • Personalize Notifications: Configure Mentions-Only Notifications and Verify Behavior
    • In this module, you will adjust Confluence email notifications to Mentions Only and verify correct behavior through a controlled test using a teammate @mention.
  • Secure Permissions Fast: Smart Permission Setup for Teams
    • You will apply structured permission models in Confluence to balance collaboration and control. The focus is on granting the right access to the right group, without overexposure.
  • Secure Permissions Fast: Auditing Permissions for Compliance
    • You will evaluate existing permissions, identify compliance risks, and close gaps using a repeatable audit approach aligned with GDPR expectations.
  • Fortify Confluence Security: Enforcing Identity, Access, and Authentication Controls
    • This lesson focuses on proactive security controls that prevent unauthorized access. You will explore identity management, SSO, MFA enforcement, and encryption-in-transit as foundational protections for Confluence environments.
  • Fortify Confluence Security: Auditing, Testing, and Proving Security Readiness
    • This lesson shifts from prevention to verification. You will practice evaluating security posture through audits, penetration scans, and compliance documentation aligned to recognized standards.
  • Manage Confluence Users: Configure Confluence User Permissions Securely
    • In this module, you will focus on configuring Confluence user permissions to meet project needs while protecting sensitive information. You will explore why permission decisions matter, how group-based access simplifies management at scale, and how to balance collaboration with security. By the end, you will be able to configure user and group permissions confidently for real project scenarios.
  • Manage Confluence Users: Audit Users, Activity, and Licenses in Confluence
    • In this module, you will focus on auditing user activity and managing licenses to maintain security and compliance. You will explore why regular audits matter, learn how to review activity logs, identify inactive users, and take action to recover licenses. By the end, you will be able to evaluate user activity and make informed decisions that support compliance and cost control.
  • Project Module: Security Audit & Remediation
    • Security and access control require continuous evaluation, evidence-based reasoning, and defensible decision-making. In this project, you will act as an IT Manager responsible for conducting a structured security audit of a Confluence environment in preparation for a compliance review. You will assess permissions, authentication controls, and user management practices to determine overall security posture. Beyond identifying issues, you will justify risk classifications, validate findings, and develop a prioritized remediation plan that balances security, usability, and operational constraints. You will document your audit approach, analyze evidence, and communicate findings in a clear, professional format suitable for stakeholders and auditors. The final outcome is a comprehensive audit report that reflects real-world expectations, demonstrating your ability to evaluate systems, defend decisions, and translate technical risks into actionable improvements.

Taught by

Professionals from the Industry

Reviews

Start your review of Access & Security Management

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.