Skip navigation

Interface protection

Interface protection: CISSP Cert Prep: 3 Security Engineering
Interface protection: CISSP Cert Prep: 3 Security Engineering

Rarely do systems ever function in isolation. Today’s complex systems work together to achieve business objectives and must talk to both users and each other to meet their goals. They do this through the use of interfaces that allow communication between systems. In this video, learn about the use of authorized interfaces as well as covert channels that may allow unauthorized communication.

Resume Transcript Auto-Scroll
Skill Level Advanced
4h 19m
Duration
13,796
Views
Show More Show Less
Skills covered in this course
Security Virtualization Cloud Computing IT CISSP

Continue Assessment

You started this assessment previously and didn't complete it. You can pick up where you left off, or start over.

Start Your Free Trial Now

Start your free trial now, and begin learning software, business and creative skills—anytime, anywhere—with video instruction from recognized industry experts.

Start Your Free Trial Now