CISSP training video: Access control models, administration, IPS/IDS
In this CISSP Essentials Security School presentation, expert instructor Shon Harris explains different types of access control models, access control administration and IPS/IDS technologies.
The Certified Information Systems Security Professional (CISSP) Access Control domain within the Common Body of Knowledge (CBK) discusses not only what authentication is, but also how access control functions within an operating system -- a complex yet vital task for governing access to enterprise services and data.
In this special multimedia presentation from SearchSecurity's CISSP Essentials Security School, expert exam trainer Shon Harris, CEO and founder of Logical Security, discusses different access control models -- how subjects access objects -- including discretionary, mandatory and role-based access control.
The presentation features Harris outlining the different methods of access control administration, as well as a number of authentication protocols, including RADIUS, TACACS+ and Diameter.
Harris concludes by discussing intrusion prevention and intrusion detection systems (IPS/IDS): What they are, the different technologies, what they do, their inherent issues and more.
Watch the video
This multimedia presentation features not only seminar-style instruction, but also interactive components students can use to reinforce the most critical topics within the domain. Throughout the video, there are sections where students must pause to explore additional domain concepts. The volume can be adjusted on the lower left-hand corner of the video screen; controls to go back to view previous slides or skip ahead can be found on the lower right-hand corner of the video screen.
Video length: Approx. 45 - 50 minutes
Bookmark this page to watch the video later.
CISSP® is a registered certification mark of the International Information Systems Security Certification Consortium, Inc., also known as (ISC)2.