Video Description

In continuing the discussion of the OSI model layer 1, we look at the types of threats that occur and protection concerns that should not be overlooked. You'll learn about layer 2, the Data Link layer and what occurs there. You'll learn why there are two sublayers, what happens at each and what type of access control and error protections live at these layers.

Course Modules

CISSP Archive (10 Domain - 2014)

CISSP 2015 Domain Restructuring