The Certified Information Systems Security Professional (CISSP) Access Control domain within the Common Body of Knowledge (CBK) discusses not only what authentication is, but also how access control functions within an operating system -- a complex yet vital task for governing access to enterprise services and data.
In this special multimedia presentation from SearchSecurity's CISSP Essentials Security School, expert exam trainer Shon Harris, CEO and founder of Logical Security, discusses different access control models -- how subjects access objects -- including discretionary, mandatory and role-based access control.
The presentation features Harris outlining the different methods of access control administration, as well as a number of authentication protocols, including RADIUS, TACACS+ and Diameter.
Watch the video
This multimedia presentation features not only seminar-style instruction, but also interactive components students can use to reinforce the most critical topics within the domain. Throughout the video, there are sections where students must pause to explore additional domain concepts. The volume can be adjusted on the lower left-hand corner of the video screen; controls to go back to view previous slides or skip ahead can be found on the lower right-hand corner of the video screen.
Video length: Approx. 45 - 50 minutes
Bookmark this page to watch the video later.
CISSP® is a registered certification mark of the International Information Systems Security Certification Consortium, Inc., also known as (ISC)2.
NEXT: Test your knowledge with the access control domain quiz
BACK: Watch the prior video on authentication technologies and identity management
BACK: Read the spotlight article on the access control domain
RETURN to the main page of SearchSecurity’s CISSP Essentials Security School