Video Description

In this segment, we visually diagraph the Kerberos Authentication process for you as it occur at the network access level. You'll see and learn in action what validation happens for public vs. private and encrypted vs. non-encrypted information, what services are involved, what transactions take place at each stage, and what hiccups can be encountered when errors and other like events take place, and what role the key distribution center plays. And finally, we identify, concerns about the Kerberos model, then discuss and explore single sign-on technologies and their differences.

Course Modules

CISSP Archive (10 Domain - 2014)

CISSP 2015 Domain Restructuring