Video Description

For this subsection of Part 1, we go more in depth on Authentication and the process of how to prove/validate information, what the three (3) types of authentication processes are and how they differ. We take a more thorough look into Passwords and you'll learn more about Synchronous vs. Asynchronous, Asynchronous Token Devices, how this authentication process works and how they function, what is required for that tokens use and validation as a process. You'll also learn about Biometric Concerns, what a Crossover Error Rate is and how to you determine fault accept/rejection rates should be.

Course Modules

CISSP Archive (10 Domain - 2014)

CISSP 2015 Domain Restructuring