Video Description

Now we'll move on to Integrity aspect of security as a means of testing modification of information. We'll discuss what audit logs tell us, and tools such as Message Digest (Hash), message authentication code (MAC) and Digital Signature –that verify modification. And finally we discuss the last tenant of security, Availability. You'll learn the differences between Denial of Service (DoS) and Distributed Denial of Service (DD0S) and why they are effective in compromising availability. You'll learn why free software off the internet is NOT really free, how it can impact the availability of systems, and why educating users the importance of NOT downloading free software is critical to keeping a network secure and its resources available.

Course Modules

CISSP Archive (10 Domain - 2014)

CISSP 2015 Domain Restructuring