O'Reilly logo

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

SSCP Video Course Domain 1 - Access Controls

Video Description

Access Controls

Shon Harris

The fast, powerful way to prepare for your SSCP exam!

Get all the hands-on training you need to pass (ISC)²’s tough SSCP exam, get certified, and move forward in your IT security career! In this online video, the world’s #1 information security trainer walks you through every skill and concept you’ll need to master. This online video contains over four and a half hours of training adapted from Shon Harris’s legendary five-day SSCP boot camps–including realistic labs, scenarios, case studies, and animations designed to build and test your knowledge in real-world settings!

Comprehensive coverage of SSCP domains of knowledge:

     .    Access controls

     .    Administrative Control

     .    Fraud Control

     .    Passwords

     .    Identity Management

     .    Validation

About the Shon Harris Security Series

This online video is part of a complete library of books, online services, and videos designed to help security professionals enhance their skills and prepare for their certification exams. Every product in this series reflects Shon Harris’s unsurpassed experience in teaching IT security professionals.

Category: Security

System Requirements

OPERATING SYSTEM: Windows 2000, XP, or Vista; Mac OS X 10.4 (Tiger) or later
MULTIMEDIA: DVD drive; 1024 x 768 or higher display; sound card with speakers
COMPUTER: 500MHz or higher CPU; 128MB RAM or more

Table of Contents

  1. Course Introduction 00:17:17
  2. Domain 1 - Access Controls 00:01:08
  3. Definitions 00:01:05
  4. Access Control Mechanism Examples 00:01:03
  5. Technical Controls 00:00:54
  6. Access Control Characteristics 00:03:25
  7. Preventive Controls 00:00:56
  8. Preventive - Administrative Controls 00:02:20
  9. Detective - Administrative Control 00:02:08
  10. Detective Examples 00:00:48
  11. Administrating Access Control (1) 00:01:25
  12. OS, Application, Database 00:00:36
  13. Administrating Access Control (2) 00:01:00
  14. Authorization Creep 00:00:59
  15. Accountability and Access Control 00:01:26
  16. Trusted Path 00:03:00
  17. Fake Login Pages Look Convincing 00:01:44
  18. Who Are You? 00:02:08
  19. Identification Issues 00:00:48
  20. Authentication Mechanisms Characteristics 00:00:44
  21. Strong Authentication 00:02:01
  22. Fraud Controls 00:02:41
  23. Internal Control Tool: Separation of Duties 00:01:38
  24. Biometrics Technology 00:01:32
  25. Example (1) 00:01:12
  26. Verification Steps 00:01:12
  27. What a Person Is 00:01:00
  28. Biometric Type 00:00:23
  29. Identification or Authentication? 00:01:21
  30. Iris Sampling 00:00:40
  31. Finger Scan 00:00:58
  32. Hand Geometry 00:00:39
  33. Facial Recognition 00:01:44
  34. Comparison 00:00:52
  35. Biometrics Verification 00:01:42
  36. Biometrics Error Types 00:01:59
  37. Crossover Error Rate 00:01:45
  38. Biometric System Types 00:02:52
  39. Passwords 00:00:40
  40. Password Generators 00:00:55
  41. Password Shoulds 00:03:02
  42. Support Issues 00:00:29
  43. Password Attacks 00:01:05
  44. Attack Steps 00:02:50
  45. Many Tools to Break Your Password 00:00:53
  46. Rainbow Table 00:01:27
  47. Passwords Should NOT Contain 00:01:26
  48. Countermeasures for Password Cracking 00:01:06
  49. Cognitive Passwords 00:00:47
  50. One-Time Password Authentication 00:01:36
  51. Synchronous Token 00:01:02
  52. One Type of Solution 00:02:34
  53. Synchronous Steps 00:00:35
  54. Administrator Configures 00:04:30
  55. Asynchronous Token Device 00:00:35
  56. Asynchronous Steps 00:02:52
  57. Challenge Response Authentication (2) 00:01:05
  58. Passphrase Authentication 00:01:30
  59. Key Protection 00:02:15
  60. Smart Card 00:00:56
  61. Characteristics 00:01:09
  62. Card Types 00:00:50
  63. Smart Card Attacks 00:01:34
  64. Software Attack 00:03:11
  65. Microprobing 00:00:53
  66. Identity Management 00:02:19
  67. How Are These Entities Controlled? 00:00:55
  68. Some Current Issues 00:01:22
  69. Management 00:03:01
  70. Typical Chaos 00:00:49
  71. Different Identities 00:01:45
  72. Identity Management Technologies 00:00:48
  73. Directory Component 00:02:05
  74. Directory Responsibilities 00:01:03
  75. Authoritative Sources 00:01:47
  76. Meta Directory 00:02:26
  77. Directory Interactions 00:01:46
  78. Web Access Management 00:01:27
  79. Web Access 00:05:09
  80. Password Management 00:02:21
  81. Legacy Single Sign-On 00:02:47
  82. Account Management Systems 00:02:23
  83. Provisioning Component 00:01:56
  84. Provisioning 00:01:59
  85. Not Just Computers 00:00:46
  86. Profile Update 00:01:29
  87. Working Together 00:03:29
  88. Enterprise Directory (2) 00:01:00
  89. Identity Management Solution Components 00:00:36
  90. Right for Your Company 00:02:17
  91. Federated Identity 00:02:59
  92. Identity Theft 00:01:19
  93. Fake Login Tools 00:00:42
  94. How Do These Attacks Work? 00:00:33
  95. Attempts to Get Your Credentials 00:01:02
  96. Instructional Emails 00:01:26
  97. Knowing What You Are Disposing of Is Important 00:01:18
  98. Other Examples 00:00:46
  99. Another Danger to Be Aware of Spyware 00:02:07
  100. Is Someone Watching You? 00:02:11
  101. What Does This Have to Do with My Computer? 00:01:37
  102. New Spyware Is Being Identified Every Week 00:00:41
  103. Spyware Comes in Many Different Forms 00:01:48
  104. Different Technologies 00:00:57
  105. Single Sign-on Technology 00:02:20
  106. Directory Services as a Single Sign-on Technology 00:01:04
  107. Active Directory 00:00:57
  108. Security Domain 00:01:27
  109. Domains of Trust 00:01:03
  110. Thin Clients 00:00:59
  111. Example (2) 00:01:13
  112. Kerberos as a Single Sign-on Technology 00:00:52
  113. Kerberos Components Working Together 00:01:48
  114. Pieces and Parts 00:01:25
  115. Kerberos Steps 00:09:08
  116. Tickets 00:02:00
  117. Steps of Validation 00:01:16
  118. Kerberos Security 00:01:30
  119. Issues Pertaining to Kerberos 00:01:25
  120. Kerberos Issues 00:01:31
  121. SESAME as a Single Sign-on Technology 00:00:38
  122. SESAME Steps for Authentication 00:02:18
  123. Combo 00:01:22
  124. Models for Access 00:00:54
  125. Access Control Models (1) 00:01:00
  126. ACL Access 00:03:00
  127. Security Issues 00:01:20
  128. Mandatory Access Control Model 00:01:50
  129. MAC Enforcement Mechanism - Labels 00:02:06
  130. Formal Model 00:00:57
  131. Software and Hardware 00:00:58
  132. Software and Hardware Guards 00:01:09
  133. Where Are They Used? 00:00:44
  134. SELinux 00:00:31
  135. MAC versus DAC 00:01:14
  136. Role-Based Access Control 00:01:14
  137. RBAC Hierarchy 00:01:44
  138. RBAC and SoD 00:00:46
  139. Acquiring Rights and Permissions 00:00:47
  140. Rule-Based Access Control 00:02:31
  141. Access Control Matrix (1) 00:01:37
  142. Capability Tables 00:00:34
  143. Temporal Access Control 00:00:54
  144. Access Control Administration 00:00:43
  145. Access Control Methods 00:00:36
  146. Centralized Approach 00:00:54
  147. Remote Centralized Administration 00:01:35
  148. RADIUS 00:00:39
  149. RADIUS Steps 00:00:55
  150. RADIUS Characteristics 00:01:17
  151. TACACS+ Characteristics 00:01:36
  152. Diameter Characteristics 00:02:27
  153. Diameter Protocol 00:01:01
  154. Mobile IP 00:01:36
  155. Diameter Architecture 00:01:41
  156. Two Pieces 00:01:09
  157. AVP 00:03:46
  158. Decentralized Access Control Administration 00:01:45
  159. Controlling Access to Sensitive Data 00:02:01
  160. Protecting Access to System Logs 00:02:05
  161. Accountability = Auditing Events 00:00:45
  162. Access Control Models (2) 00:00:38
  163. Policy versus Model 00:00:52
  164. State Machine 00:02:17
  165. Information Flow 00:01:38
  166. Information Flow Model 00:00:35
  167. Bell-LaPadula 00:05:28
  168. Tranquility Types 00:00:55
  169. Biba 00:01:39
  170. Definition of Integrity 00:00:42
  171. Biba Access Rules 00:02:01
  172. Clark-Wilson 00:00:57
  173. Goals of Model 00:02:03
  174. Clark Wilson Components 00:02:33
  175. Clark-Wilson (Cont.) 00:00:46
  176. Clark-Wilson Model 00:01:34
  177. Non-Interference Model 00:01:22
  178. Lattice-Based Access Control 00:03:29
  179. Access Control Matrix Model 00:00:52
  180. Access Control Matrix (2) 00:01:08
  181. Brewer and Nash Model - Chinese Wall 00:02:10
  182. Take-Grant Model 00:01:29
  183. Domain 1 Review 00:02:00