Video Description

In this last section we wrap up Access Controls by reviewing all the key objectives that contribute to an effective Access Control system. We discuss IAAA, review Access Control Models and the three types of Authentication, detail the Authorization process life cycle, and finally reexamine Centralized vs. Decentralized Administration.

Course Modules

CISSP Archive (10 Domain - 2014)

CISSP 2015 Domain Restructuring