O'Reilly logo

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

CISSP Video Course Domain 2 – Access Control

Video Description

The fast, powerful way to prepare for your CISSP exam!

30+ hours of personal video training from leading security expert Shon Harris

Achieving the (ISC)2’s globally recognized CISSP can give your IT career a lift. In this DVD, the world’s #1 CISSP trainer brings her legendary five-day boot camp to your computer screen. Packed with over 30 hours of instruction adapted from Shon’s classes, this video course includes realistic labs, scenarios, case studies, and animations designed to build and test your knowledge in real-word settings. Preparing for the CISSP has never been this easy or convenient.

Master the skills and concepts you need for all ten CISSP common body of knowledge domains:

  • Access Control

  • Application Security

  • Business Continuity and Disaster Recovery Planning

  • Cryptography

  • Information Security and Risk Management

  • Legal, Regulations, Compliance, and Investigations

  • Operations Security

  • Physical (Environmental) Security

  • Security Architecture and Design

  • Telecommunications and Network Security

  • System Requirements

    OPERATING SYSTEM: Windows 2000, XP, or Vista; Mac OS X 10.4 (Tiger) or later
    MULTIMEDIA: DVD drive; 1024 x 768 or higher display; sound card with speakers
    COMPUTER: 500MHz or higher CPU; 128MB RAM or more

    Table of Contents

    1. Course Introduction 00:07:24
    2. Domain 2 – Access Control 00:00:39
    3. Agenda 1 00:01:16
    4. Access Control Mechanism Examples 00:01:03
    5. Technical Controls 00:00:54
    6. Access Control Characteristics 00:03:25
    7. Preventive Controls 00:03:01
    8. Control Combinations 00:00:15
    9. Detective – Administrative Control 00:02:08
    10. Detective Examples 00:00:48
    11. Administrating Access Control 00:03:01
    12. Authorization Creep 00:00:59
    13. Accountability and Access Control 00:01:26
    14. Trusted Path 00:03:00
    15. Fake Login Pages Look Convincing 00:01:44
    16. Who Are You? 00:02:08
    17. Identification Issues 00:00:48
    18. Authentication Mechanisms Characteristics 00:00:44
    19. Strong Authentication 00:02:01
    20. Fraud Controls 00:02:41
    21. Internal Control Tool: Separation of Duties 00:01:14
    22. Authentication Mechanisms in Use Today 00:03:08
    23. Verification Steps 00:01:12
    24. What a Person Is 00:00:21
    25. Why Use Biometrics? 00:01:01
    26. Identification or Authentication? 00:01:21
    27. Iris Sampling 00:00:40
    28. Finger Scan 00:00:58
    29. Hand Geometry 00:04:03
    30. Downfalls to Biometric Use 00:00:54
    31. Biometrics Error Types 00:01:59
    32. Crossover Error Rate 00:01:45
    33. Biometric System Types 00:02:52
    34. Passwords 00:05:06
    35. Password Attacks 00:01:05
    36. Attack Steps 00:02:50
    37. Many Tools to Break Your Password 00:00:53
    38. Rainbow Table 00:01:27
    39. Passwords Should NOT Contain… 00:01:26
    40. Countermeasures for Password Cracking 00:01:06
    41. Cognitive Passwords 00:00:47
    42. One-Time Password Authentication 00:01:36
    43. Synchronous Token 00:01:02
    44. One Type of Solution 00:03:09
    45. Administrator Configures 00:00:13
    46. Challenge Response Authentication 00:04:17
    47. Asynchronous Token Device 00:03:27
    48. Challenge Response Authentication 00:00:21
    49. Cryptographic Keys 00:00:44
    50. Passphrase Authentication 00:01:30
    51. Key Protection 00:00:25
    52. Memory Cards 00:01:25
    53. Memory Card Characteristics 00:00:25
    54. Smart Card 00:00:56
    55. Characteristics 00:01:09
    56. Card Types 00:00:50
    57. Smart Card Attacks 00:01:34
    58. Software Attack 00:01:02
    59. Side Channel Attack 00:01:19
    60. Side Channel Data Collection 00:00:51
    61. Microprobing 00:00:53
    62. Identity Management 00:02:19
    63. How Are These Entities Controlled? 00:00:55
    64. Some Current Issues 00:01:22
    65. Management 00:03:01
    66. Typical Chaos 00:00:49
    67. Different Identities 00:01:45
    68. Identity Management Technologies 00:00:48
    69. Directory Component 00:01:17
    70. Enterprise Directory 00:00:48
    71. Directory Responsibilities 00:01:03
    72. Authoritative Sources 00:01:47
    73. Meta Directory 00:02:26
    74. Directory Interactions 00:01:46
    75. Web Access Management 00:01:27
    76. Web Access 00:05:09
    77. Password Management 00:02:21
    78. Legacy Single Sign-On 00:02:47
    79. Account Management Systems 00:02:23
    80. Provisioning Component 00:04:42
    81. Profile Update 00:01:29
    82. Working Together 00:03:29
    83. Enterprise Directory 00:01:00
    84. Identity Management Solution Components 00:02:52
    85. Federated Identity 00:02:59
    86. Identity Theft 00:01:19
    87. Fake Login Tools 00:02:17
    88. Instructional Emails 00:01:26
    89. Knowing What You Are Disposing of Is Important 00:01:18
    90. Other Examples 00:00:46
    91. Another Danger to Be Aware of… Spyware 00:02:07
    92. Is Someone Watching You? 00:02:11
    93. What Does This Have to Do with My Computer? 00:01:37
    94. New Spyware Is Being Identified Every Week 00:01:09
    95. How to Prevent Spyware 00:01:19
    96. Different Technologies 00:00:57
    97. Single Sign-on Technology 00:04:21
    98. Security Domain 00:01:27
    99. Domains of Trust 00:01:03
    100. Thin Clients 00:00:59
    101. Example 00:01:13
    102. Kerberos as a Single Sign-on Technology 00:13:13
    103. Tickets 00:03:43
    104. Why Go Through All of this Trouble? 00:01:02
    105. Issues Pertaining to Kerberos 00:01:25
    106. Kerberos Issues 00:01:31
    107. SESAME as a Single Sign-on Technology 00:00:38
    108. SESAME Steps for Authentication 00:02:18
    109. Combo 00:01:22
    110. Models for Access 00:00:54
    111. Access Control Models 00:01:00
    112. ACL Access 00:01:51
    113. File Permissions 00:01:09
    114. Security Issues 00:01:20
    115. Mandatory Access Control Model 00:01:50
    116. MAC Enforcement Mechanism – Labels 00:02:06
    117. Formal Model 00:00:57
    118. Software and Hardware 00:00:58
    119. Software and Hardware Guards 00:02:25
    120. MAC versus DAC 00:01:14
    121. Role-Based Access Control 00:01:14
    122. RBAC Hierarchy 00:03:17
    123. Rule-Based Access Control 00:02:16
    124. Firewall Example 00:00:14
    125. Access Control Matrix 00:02:11
    126. Temporal Access Control 00:00:54
    127. Access Control Administration 00:02:13
    128. Remote Centralized Administration 00:01:35
    129. RADIUS 00:01:34
    130. RADIUS Characteristics 00:01:17
    131. TACACS+ Characteristics 00:01:36
    132. Diameter Characteristics 00:02:27
    133. Diameter Protocol 00:01:01
    134. Mobile IP 00:01:36
    135. Diameter Architecture 00:01:41
    136. Two Pieces 00:01:09
    137. AVP 00:03:46
    138. Decentralized Access Control Administration 00:01:45
    139. Controlling Access to Sensitive Data 00:04:51
    140. IDS 00:02:19
    141. IDS Steps 00:01:26
    142. Network IDS Sensors 00:02:00
    143. Host IDS 00:01:31
    144. Combination 00:01:38
    145. Types of IDSs 00:02:32
    146. Signature-Based Example 00:02:29
    147. Behavior-Based IDS 00:03:32
    148. Statistical Anomaly 00:01:05
    149. Statistical IDS 00:00:45
    150. Protocol Anomaly 00:01:45
    151. What Is a Protocol Anomaly? 00:01:30
    152. Protocol Anomaly Issues 00:00:48
    153. Traffic Anomaly 00:03:47
    154. IDS Response Mechanisms 00:01:10
    155. Responses to Attacks 00:01:37
    156. IDS Issues 00:04:38
    157. Vulnerable IDS 00:02:30
    158. Domain 2 Review 00:02:29