ITperfection

Conduct Security Control Testing- Part 1

2020-07-15T12:43:43+00:00Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , |

Conduct Security Control Testing- Part 1 One of the most important topics in CISSP course is conduct security control testing. In this part of this tutorial, we'll take a look at control testing to help you understand the different aspects of control testing. Security control testing employs various tools and techniques, including vulnerability assessments, [...]

Manage the Identity and Access Provisioning Lifecycle

2020-07-16T06:41:38+00:00Tags: , , , , , , , , , , , , |

Manage the Identity and Access Provisioning Lifecycle The life cycle consists of the assignment of privileges through roles and designation. The following design, a typical identity and provisioning life cycle consists of these steps: Enrolment of user or create user Determining roles, privileges, and access requirements to systems and applications Provisioning user accounts to [...]

Manage Identification and Authentication

2020-07-16T06:39:28+00:00Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , |

Manage Identification and Authentication of People, Devices, and Services In this part of this tutorial, we'll take a look at Manage Identification and Authentication of People, Devices, and Services to help you understand the different aspects of authentication. Identity Management Implementation The core activity within identity and access management (IAM) is the management of [...]

Control Physical and Logical Access to Assets

2020-07-16T06:04:46+00:00Tags: , , , , , , , , , , , , , , , , , |

Control Physical and Logical Access to Assets Controlling access to assets is one of the central approaches to security. In this section; an asset includes information, systems, devices, and facilities. Systems An organization’s systems include any IT systems, which provide one or more services. Like a SQL Server, a FTP server, a Domain Controller, [...]

Secure Communication Channels

2020-07-16T07:09:00+00:00Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , |

Secure Communication Channels This section focuses on securing data in motion. Such as voice, e-mail, web, fax, remote access and virtualized networks. One of the important topics in CISSP course is secure communication channels. So, in this part of this tutorial, we'll take a look at secure communication to help you understand the different [...]

Secure Network Components

2020-07-16T07:11:17+00:00Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , |

Secure Network Components Network equipment must be securely operated and maintained. In this part of this tutorial, we'll take a look at secure networks to help you understand the different aspects of secure network components. You as a CISSP candidate need to understand security fundamentals and concepts specifically related to different types of network [...]

Wireless Networks Security

2020-07-16T07:20:44+00:00Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , |

Wireless Networks Security IEEE proposed the 802.11 standards for wireless communications. Various versions have been developed in wireless networking hardware: WLAN Security Techniques and Protocols Security techniques and protocols for wireless communication include: Service Set Identifier (SSID): It is a name that identifies a wireless network. Each wireless network must have a SSID. [...]

Implications of Multilayer Protocols

2020-07-16T07:04:43+00:00Tags: , , , , , , , , , , , , , , , |

Implications of Multilayer Protocols TCP/IP consists of dozens of individual protocols spread across various protocol stack layers, and in fact, is a multilayer protocol. This feature gives TCP/IP significant advantages: Benefits of Multilayer Protocols: Encryption can be integrated at various layers. A wide range of protocols can be used at higher layers. Supports flexibility [...]

TCP/IP Model

2020-07-16T07:19:01+00:00Tags: , , , , , , , , , , , |

TCP/IP Model In this part of this tutorial, we'll take a look at TCP-IP model to help you understand the different aspects of requirements for TCP-IP model.  The Transmission Control Protocol/Internet Protocol (TCP/IP) Model is similar to the OSI Reference Model but consists of only four layers: Application Transport Internet Link The designers of [...]

Go to Top