Video description
The fast, powerful way to prepare for your CISSP exam!
30+ hours of personal video training from leading security expert Shon Harris
Achieving the (ISC)2’s globally recognized CISSP can give your IT career a lift. In this DVD, the world’s #1 CISSP trainer brings her legendary five-day boot camp to your computer screen. Packed with over 30 hours of instruction adapted from Shon’s classes, this video course includes realistic labs, scenarios, case studies, and animations designed to build and test your knowledge in real-word settings. Preparing for the CISSP has never been this easy or convenient.
Master the skills and concepts you need for all ten CISSP common body of knowledge domains:
- Access Control
- Application Security
- Business Continuity and Disaster Recovery Planning
- Cryptography
- Information Security and Risk Management
- Legal, Regulations, Compliance, and Investigations
- Operations Security
- Physical (Environmental) Security
- Security Architecture and Design
- Telecommunications and Network Security
System Requirements
OPERATING SYSTEM: Windows 2000, XP, or Vista; Mac OS X 10.4 (Tiger) or laterMULTIMEDIA: DVD drive; 1024 x 768 or higher display; sound card with speakers
COMPUTER: 500MHz or higher CPU; 128MB RAM or more
Table of contents
- Course Introduction
- Domain 2 - Access Control
- Agenda 1
- Access Control Mechanism Examples
- Technical Controls
- Access Control Characteristics
- Preventive Controls
- Control Combinations
- Detective - Administrative Control
- Detective Examples
- Administrating Access Control
- Authorization Creep
- Accountability and Access Control
- Trusted Path
- Fake Login Pages Look Convincing
- Who Are You?
- Identification Issues
- Authentication Mechanisms Characteristics
- Strong Authentication
- Fraud Controls
- Internal Control Tool: Separation of Duties
- Authentication Mechanisms in Use Today
- Verification Steps
- What a Person Is
- Why Use Biometrics?
- Identification or Authentication?
- Iris Sampling
- Finger Scan
- Hand Geometry
- Downfalls to Biometric Use
- Biometrics Error Types
- Crossover Error Rate
- Biometric System Types
- Passwords
- Password Attacks
- Attack Steps
- Many Tools to Break Your Password
- Rainbow Table
- Passwords Should NOT Contain...
- Countermeasures for Password Cracking
- Cognitive Passwords
- One-Time Password Authentication
- Synchronous Token
- One Type of Solution
- Administrator Configures
- Challenge Response Authentication
- Asynchronous Token Device
- Challenge Response Authentication
- Cryptographic Keys
- Passphrase Authentication
- Key Protection
- Memory Cards
- Memory Card Characteristics
- Smart Card
- Characteristics
- Card Types
- Smart Card Attacks
- Software Attack
- Side Channel Attack
- Side Channel Data Collection
- Microprobing
- Identity Management
- How Are These Entities Controlled?
- Some Current Issues
- Management
- Typical Chaos
- Different Identities
- Identity Management Technologies
- Directory Component
- Enterprise Directory
- Directory Responsibilities
- Authoritative Sources
- Meta Directory
- Directory Interactions
- Web Access Management
- Web Access
- Password Management
- Legacy Single Sign-On
- Account Management Systems
- Provisioning Component
- Profile Update
- Working Together
- Enterprise Directory
- Identity Management Solution Components
- Federated Identity
- Identity Theft
- Fake Login Tools
- Instructional Emails
- Knowing What You Are Disposing of Is Important
- Other Examples
- Another Danger to Be Aware of... Spyware
- Is Someone Watching You?
- What Does This Have to Do with My Computer?
- New Spyware Is Being Identified Every Week
- How to Prevent Spyware
- Different Technologies
- Single Sign-on Technology
- Security Domain
- Domains of Trust
- Thin Clients
- Example
- Kerberos as a Single Sign-on Technology
- Tickets
- Why Go Through All of this Trouble?
- Issues Pertaining to Kerberos
- Kerberos Issues
- SESAME as a Single Sign-on Technology
- SESAME Steps for Authentication
- Combo
- Models for Access
- Access Control Models
- ACL Access
- File Permissions
- Security Issues
- Mandatory Access Control Model
- MAC Enforcement Mechanism - Labels
- Formal Model
- Software and Hardware
- Software and Hardware Guards
- MAC versus DAC
- Role-Based Access Control
- RBAC Hierarchy
- Rule-Based Access Control
- Firewall Example
- Access Control Matrix
- Temporal Access Control
- Access Control Administration
- Remote Centralized Administration
- RADIUS
- RADIUS Characteristics
- TACACS+ Characteristics
- Diameter Characteristics
- Diameter Protocol
- Mobile IP
- Diameter Architecture
- Two Pieces
- AVP
- Decentralized Access Control Administration
- Controlling Access to Sensitive Data
- IDS
- IDS Steps
- Network IDS Sensors
- Host IDS
- Combination
- Types of IDSs
- Signature-Based Example
- Behavior-Based IDS
- Statistical Anomaly
- Statistical IDS
- Protocol Anomaly
- What Is a Protocol Anomaly?
- Protocol Anomaly Issues
- Traffic Anomaly
- IDS Response Mechanisms
- Responses to Attacks
- IDS Issues
- Vulnerable IDS
- Domain 2 Review
Product information
- Title: CISSP Video Course Domain 2 - Access Control
- Author(s):
- Release date: May 2009
- Publisher(s): Pearson IT Certification
- ISBN: 9780789740144
You might also like
video
The Complete Cybersecurity Bootcamp (Video Collection): Threat Defense, Ethical Hacking, and Incident Handling
More than 25 Hours of Expert Video Instruction This course is a complete guide to help …
video
CISSP
Duration 24 Hours of Video Instruction Overview CISSP Complete Video Course is an engaging self-paced video …
video
CISSP Video Mentor
Learn exam essentials from the Expert The fast, powerful way to prepare for your CISSP exam! …
video
CISSP Exam Prep
More than 6 Hours of Video Instruction More than 6 hours of concentrated training on the …