The Certified Information Systems Security Professional (CISSP) Access Control domain within the Common Body of Knowledge (CBK) is one of the most critical domains within the entire CISSP program because enterprise access control systems are often exploited or subverted by attackers. Once an attacker gains access into a network, he or she can compromise sensitive assets, creating a critical risk to enterprise security.
In this special multimedia presentation from SearchSecurity's CISSP Essentials Security School, expert CISSP exam trainer Shon Harris, CEO and founder of Logical Security, offers a comprehensive overview of the access control section of the CBK.
Harris begins by explaining the four steps of authentication: identification, accountability, authentication and authorization. Harris continues, discussing different authentication characteristics, the importance of two-factor authentication technologies, and two access types: user access and device access.
The CISSP training presentation delves into what identity management systems are and their goals, and also touches upon the topics of digital identity and federated identity. Harris discusses cross-domain access, single sign-on and the authentication protocol Kerberos.
Watch the video
This multimedia presentation features not only seminar-style instruction, but also interactive components students can use to reinforce the most critical topics within the domain. Throughout the video, there are sections where students must pause to explore additional domain concepts. The volume can be adjusted on the lower left-hand corner of the video screen; controls to go back to view previous slides or skip ahead can be found on the lower right-hand corner of the video screen.
Video length: Approx. 45 – 50 minutes
Bookmark this page to watch the video later.
CISSP® is a registered certification mark of the International Information Systems Security Certification Consortium, Inc., also known as (ISC)2.
Watch the next presentation in this domain on access control models and IPS/IDS
Read the spotlight article on the access control domain
Return to the main page of SearchSecurity’s CISSP Essentials Security School