Manage Learn to apply best practices and optimize your operations.

CISSP training video: Access control models, administration, IPS/IDS

In this CISSP Essentials Security School presentation, expert instructor Shon Harris explains different types of access control models, access control administration and IPS/IDS technologies.

The Certified Information Systems Security Professional (CISSP) Access Control domain within the Common Body of Knowledge (CBK) discusses not only what authentication is, but also how access control functions within an operating system -- a complex yet vital task for governing access to enterprise services and data.

In this special multimedia presentation from SearchSecurity's CISSP Essentials Security School, expert exam trainer Shon Harris, CEO and founder of Logical Security, discusses different access control models -- how subjects access objects -- including discretionary, mandatory and role-based access control.

The presentation features Harris outlining the different methods of access control administration, as well as a number of authentication protocols, including RADIUS, TACACS+ and Diameter.

Harris concludes by discussing intrusion prevention and intrusion detection systems (IPS/IDS): What they are, the different technologies, what they do, their inherent issues and more.

Watch the video

This multimedia presentation features not only seminar-style instruction, but also interactive components students can use to reinforce the most critical topics within the domain. Throughout the video, there are sections where students must pause to explore additional domain concepts. The volume can be adjusted on the lower left-hand corner of the video screen; controls to go back to view previous slides or skip ahead can be found on the lower right-hand corner of the video screen.

Video length: Approx. 45 - 50 minutes

Bookmark this page to watch the video later.

CISSP® is a registered certification mark of the International Information Systems Security Certification Consortium, Inc., also known as (ISC)2.

Next Steps

NEXT: Test your knowledge with the access control domain quiz

BACK: Watch the prior video on authentication technologies and identity management

BACK: Read the spotlight article on the access control domain

RETURN to the main page of SearchSecurity’s CISSP Essentials Security School

This was last published in September 2014

Dig Deeper on CISSP certification

PRO+

Content

Find more PRO+ content and other member only offers, here.

Start the conversation

Send me notifications when other members comment.

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Please create a username to comment.

-ADS BY GOOGLE

SearchCloudSecurity

SearchNetworking

SearchCIO

SearchEnterpriseDesktop

SearchCloudComputing

ComputerWeekly.com

Close