Video Description

As we near completion of our Telecommunications Chapter, we examine Firewalls and the concept of trusting and not trusting traffic and how those determinations are made. You'll learn how this correlates to the OSI models, what happens at certain OSI layers that directly ties into how a firewall works. You'll learn the purpose behind a proxy, packet filters, the different types of proxies, how differently they each function and at what OSI level proxies works.

Course Modules

CISSP Archive (10 Domain - 2014)

CISSP 2015 Domain Restructuring