O'Reilly logo

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

CompTIA Security+ SY0-201 Video Course Domain 3 - Access Control

Video Description

Access Control

Shon Harris

The fast, powerful way to prepare for your CompTIA Security+ exam!

Get all the hands-on training you need to pass (ISC)²’s tough SSCP exam, get certified, and move forward in your IT security career! In this online video, the world’s #1 information security trainer walks you through every skill and concept you’ll need to master. This online video contains over six hours of training adapted from Shon Harris’s legendary five-day SSCP boot camps–including realistic labs, scenarios, case studies, and animations designed to build and test your knowledge in real-world settings!

Comprehensive coverage of CompTIA Security+ domains of knowledge:

     .    Access Control Characters

     .    Fraud Controls

     .    Access Control Matrix

     .    Remote Authentication

     .    Wireless Proximity Devices

     .    Alarm Systems

About the Shon Harris Security Series

This online video is part of a complete library of books, online services, and videos designed to help security professionals enhance their skills and prepare for their certification exams. Every product in this series reflects Shon Harris’s unsurpassed experience in teaching IT security professionals.

Category: Security

System Requirements

OPERATING SYSTEM: Windows 2000, XP, or Vista; Mac OS X 10.4 (Tiger) or later
MULTIMEDIA: DVD drive; 1024 x 768 or higher display; sound card with speakers
COMPUTER: 500MHz or higher CPU; 128MB RAM or more

Table of Contents

  1. Course Introduction 00:06:59
  2. Domain 3 - Access Control 00:00:08
  3. Access Control 00:00:43
  4. Definitions 00:01:05
  5. Access Control Mechanism Examples 00:01:03
  6. Technical Controls 00:00:54
  7. Access Control Characteristics 00:03:25
  8. Preventive Controls 00:00:56
  9. Preventive - Administrative Controls 00:01:15
  10. Fake Login Pages Look Convincing 00:01:05
  11. Detective - Administrative Control 00:02:08
  12. Detective Examples 00:00:48
  13. Administrating Access Control 00:01:25
  14. OS, Application, Database 00:00:36
  15. Administrating Access Control 00:01:00
  16. Authorization Creep 00:00:59
  17. Accountability and Access Control 00:01:26
  18. Trusted Path 00:03:00
  19. Fake Login Pages Look Convincing 00:01:44
  20. Who Are You? 00:02:08
  21. Identification Issues 00:00:48
  22. Authentication Mechanisms Characteristics 00:00:44
  23. Strong Authentication 00:02:01
  24. Fraud Controls 00:02:41
  25. Internal Control Tool: Separation of Duties 00:01:14
  26. Authentication Mechanisms in Use Today 00:00:24
  27. Biometrics Technology 00:01:05
  28. Biometric Devices 00:00:27
  29. Example 00:01:12
  30. Verification Steps 00:01:33
  31. Why Use Biometrics? 00:00:38
  32. Biometric Type 00:01:44
  33. Iris Sampling 00:00:40
  34. Finger Scan 00:00:58
  35. Hand Geometry 00:00:39
  36. Facial Recognition 00:01:44
  37. Comparison 00:00:52
  38. Biometrics Verification 00:00:41
  39. Issues 00:01:02
  40. Biometrics Error Types 00:01:59
  41. Crossover Error Rate 00:01:45
  42. Biometric System Types 00:02:52
  43. Passwords 00:00:40
  44. Password Generators 00:00:55
  45. Password Shoulds 00:03:31
  46. Password Attacks 00:01:05
  47. Attack Steps 00:02:50
  48. Many Tools to Break Your Password 00:00:53
  49. Rainbow Table 00:01:27
  50. Passwords Should NOT Contain 00:01:26
  51. Countermeasures for Password Cracking 00:01:06
  52. Cognitive Passwords 00:00:47
  53. One-Time Password Authentication 00:01:36
  54. Synchronous Token 00:01:02
  55. One Type of Solution 00:02:34
  56. Synchronous Steps 00:00:48
  57. Challenge Response Authentication 00:04:17
  58. Asynchronous Token Device 00:00:35
  59. Asynchronous Steps 00:02:52
  60. Challenge Response Authentication 00:01:05
  61. Passphrase Authentication 00:01:30
  62. Key Protection 00:02:15
  63. Smart Card 00:00:56
  64. Characteristics 00:01:09
  65. Card Types 00:00:50
  66. Smart Card Attacks 00:01:34
  67. Software Attack 00:01:02
  68. Side Channel Attack 00:01:19
  69. Side Channel Data Collection 00:00:51
  70. Microprobing 00:00:53
  71. Identity Management 00:02:19
  72. How Are These Entities Controlled? 00:00:55
  73. Some Current Issues 00:01:22
  74. Management 00:03:01
  75. Typical Chaos 00:00:49
  76. Different Identities 00:01:45
  77. Identity Management Technologies 00:00:48
  78. Directory Component 00:01:17
  79. Enterprise Directory 00:00:48
  80. Directory Responsibilities 00:01:03
  81. Authoritative Sources 00:01:47
  82. Meta Directory 00:02:26
  83. Directory Interactions 00:01:46
  84. Web Access Management 00:01:27
  85. Web Access 00:05:09
  86. Password Management 00:02:21
  87. Legacy Single Sign-On 00:02:47
  88. Account Management Systems 00:02:23
  89. Provisioning Component 00:01:56
  90. Provisioning 00:01:59
  91. Not Just Computers 00:00:46
  92. Profile Update 00:01:29
  93. Working Together 00:03:29
  94. Enterprise Directory 00:01:00
  95. Identity Management Solution Components 00:00:36
  96. Right for Your Company 00:02:17
  97. Federated Identity 00:02:59
  98. Different Technologies 00:00:57
  99. Single Sign-on Technology 00:00:30
  100. Single Sign-on 00:01:50
  101. Directory Services as a Single Sign-on Technology 00:01:04
  102. Active Directory 00:00:57
  103. Security Domain 00:01:27
  104. Domains of Trust 00:00:35
  105. Domain Illustration 00:00:29
  106. Thin Clients 00:00:59
  107. Example 00:01:13
  108. Kerberos as a Single Sign-on Technology 00:00:52
  109. Kerberos Components Working Together 00:01:48
  110. Pieces and Parts 00:00:13
  111. More Components of Kerberos 00:00:32
  112. KDC Components 00:00:41
  113. Kerberos Steps 00:09:08
  114. Tickets 00:02:00
  115. Steps of Validation 00:01:16
  116. Kerberos Security 00:01:30
  117. Issues Pertaining to Kerberos 00:01:25
  118. Kerberos Issues 00:01:31
  119. SESAME as a Single Sign-on Technology 00:00:38
  120. SESAME Steps for Authentication 00:02:18
  121. Combo 00:01:22
  122. Models for Access 00:00:54
  123. Access Control Models 00:00:14
  124. Discretionary Access Control Model 00:00:46
  125. ACL Access 00:02:08
  126. Enforcing a DAC Policy 00:00:52
  127. Security Issues 00:01:20
  128. Mandatory Access Control Model 00:01:50
  129. MAC Enforcement Mechanism - Labels 00:02:06
  130. Formal Model 00:00:57
  131. Software and Hardware 00:00:58
  132. Software and Hardware Guards 00:01:09
  133. Where Are They Used? 00:00:44
  134. SELinux 00:00:31
  135. MAC versus DAC 00:01:14
  136. Role-Based Access Control 00:01:14
  137. RBAC Hierarchy 00:01:44
  138. RBAC and SoD 00:00:46
  139. Acquiring Rights and Permissions 00:00:47
  140. Rule-Based Access Control 00:02:31
  141. Access Control Matrix 00:01:37
  142. Capability Tables 00:00:34
  143. Temporal Access Control 00:00:54
  144. Access Control Administration 00:00:43
  145. Access Control Methods 00:00:36
  146. Centralized Approach 00:00:54
  147. Remote Centralized Administration 00:01:35
  148. RADIUS 00:00:39
  149. RADIUS Steps 00:00:55
  150. RADIUS Characteristics 00:01:17
  151. TACACS+ Characteristics 00:01:36
  152. Diameter Characteristics 00:02:27
  153. Diameter Protocol 00:01:01
  154. Mobile IP 00:01:36
  155. Diameter Architecture 00:01:41
  156. Two Pieces 00:01:09
  157. AVP 00:03:46
  158. Decentralized Access Control Administration 00:01:45
  159. Controlling Access to Sensitive Data 00:02:01
  160. Protecting Access to System Logs 00:02:05
  161. Accountability = Auditing Events 00:00:45
  162. Agenda 2 00:02:19
  163. IDS Steps 00:01:26
  164. Network IDS Sensors 00:02:00
  165. Host IDS 00:01:31
  166. Combination 00:01:38
  167. Types of IDSs 00:02:32
  168. Signature-Based Example 00:02:29
  169. Behavior-Based IDS 00:03:32
  170. Statistical Anomaly 00:01:05
  171. Statistical IDS 00:00:45
  172. Protocol Anomaly 00:01:45
  173. What Is a Protocol Anomaly? 00:01:30
  174. Protocol Anomaly Issues 00:00:48
  175. Traffic Anomaly 00:03:47
  176. IDS Response Mechanisms 00:01:10
  177. Responses to Attacks 00:01:37
  178. IDS Issues 00:01:55
  179. Intrusion Prevention System 00:02:19
  180. Differences 00:00:24
  181. Vulnerable IDS 00:00:47
  182. Trapping an Intruder 00:01:43
  183. Controlling Remote Access 00:10:39
  184. Remote Authentication 00:02:14
  185. Mutual Authentication 00:02:47
  186. Without Mutual Authentication 00:02:23
  187. Group Policies 00:01:55
  188. File and Print Resources 00:02:15
  189. File and Print Resources - Protection 00:02:07
  190. Physical Access Security 00:00:48
  191. Different Types of Threats 00:00:42
  192. Wake Up Call 00:00:35
  193. Not Just Hacking 00:00:37
  194. Number One Priority 00:01:19
  195. Physical Security Program Goals 00:01:41
  196. Planning Process 00:01:35
  197. Risk Assessment Needs to be Carried Out 00:01:04
  198. Deterrence Options 00:01:06
  199. Delay 00:00:19
  200. Layered Defense Model 00:00:49
  201. Detection 00:01:04
  202. Weak Link in the Chain 00:00:41
  203. Agenda 1 00:01:20
  204. Crime Prevention through Environmental Design 00:02:14
  205. CPTED Main Strategies 00:00:39
  206. Target Hardening 00:00:42
  207. Access Barriers 00:02:11
  208. Facility Construction 00:00:49
  209. Construction Materials 00:00:43
  210. Rebar Encased in Concrete 00:00:24
  211. Data Center 00:01:04
  212. Designing a Secure Site 00:01:24
  213. Door Types 00:01:51
  214. Window Types 00:01:13
  215. Sensitive Areas 00:01:00
  216. Security Zones 00:00:16
  217. Various Sensors 00:00:14
  218. Lock Types 00:01:47
  219. Entry Access Control 00:01:53
  220. Wireless Proximity Devices 00:00:49
  221. Device Types 00:00:42
  222. Piggybacking 00:00:49
  223. Entrance Protection 00:01:19
  224. Door Configurations 00:00:32
  225. External Boundary Protection 00:02:54
  226. Fencing Characteristics 00:00:42
  227. Fencing Issues 00:00:50
  228. Gates 00:01:40
  229. Lighting Issues 00:01:09
  230. Perimeter Security - Security Guards 00:00:42
  231. Guard Tasks 00:01:03
  232. Security Guards 00:01:57
  233. CCTV 00:04:27
  234. Agenda 2 00:01:00
  235. Intrusion Detection Characteristics 00:01:04
  236. Electro-Mechanical Sensors 00:01:12
  237. Volumetric Sensors 00:02:07
  238. Alarm Systems 00:00:45
  239. Securing Mobile Devices 00:02:08
  240. Agenda 3 00:00:27
  241. HVAC Attributes 00:01:38
  242. Environmental Considerations 00:01:01
  243. Who's Got Gas? 00:01:04
  244. Documentation of Procedures 00:06:30
  245. Power Preventive Measures 00:01:46
  246. Device Protection 00:01:14
  247. Agenda 4 00:01:25
  248. Automatic Detector Mechanisms 00:02:18
  249. Fire Detection 00:01:34
  250. Fire Types 00:02:56
  251. Emergency Power Off Switch 00:01:09
  252. Fire Suppression Systems 00:04:24
  253. Fire Extinguishers 00:00:47
  254. Emergency Procedures 00:01:41
  255. Domain 3 Review 00:00:46