Video Description

Before we conclude our discussion on biometric mechanism, we must review Strong Authentication. We look at how Strong Authentication works, and discuss examples of it such as Wireless Access Points and the use of certificates for additional user and network resource validation.

Course Modules

CISSP Archive (10 Domain - 2014)

CISSP 2015 Domain Restructuring