Video Description

We begin this discussion with an overview on Kerberos technology for network authentication. Think neighborhood carnival, that's the analogy used to help explain how Kerberos authentication works. You'll learn in detail what each phase of access control entails, and how interdependent those stages are upon one another in order for the appropriate access to be granted, and what happens when or to cause a rejection of an access request.

Course Modules

CISSP Archive (10 Domain - 2014)

CISSP 2015 Domain Restructuring