Video Description

This lesson covers secure technologies and covers the following: • Authentication and identity management • Credential management • Traffic flow control • Trusted computing The instructor offers different models and examples of these concepts and explains the advantages and disadvantages of each.

Course Modules

ISC2 Certified Secure Software Life-cycle Professional (CSSLP)