Occasionally you will need to allow visitors to access your secured facilities. It is important to have visitor control procedures in place that describe who may authorize visitor access and how visitors may behave in your facilities. Learn about visitor logs, badges, escorts, and surveillance cameras.
- [Lecturer] Occasionally, you will need to allow…visitors to access your secured facilities.…It is important to have visitor control procedures in place…that describe who may authorize visitor access…and how visitors may behave in your facilities.…Your visitor access procedures…should clearly identify the allowable reasons…that a visitor might access your facilities…and the appropriate levels of approval required…for different types of visitors in different circumstances.…It should also explain what types of visitors, if any,…may be granted unescorted access to the facility…and who may escort other visitors.…
Each time a visitor enters a secure facility…you should maintain a log of that access.…This may be as simple as asking visitors to sign…a paper visitor register or it may use…a more complex electronic process.…All individuals inside a secure facility…should wear identification badges that are…clearly displayed on their person.…Badges for visitors should be distinctive enough…that employees can quickly recognize whether someone…
Members who take all eight courses in the series will be prepared to take and pass the CISSP exam. Find the companion study books at the Sybex test prep site and review the complete CISSP Body of Knowledge at https://www.isc2.org/cissp-domains/default.aspx.
- Understanding security and evaluation models
- Cloud computing and virtualization
- Securing hardware
- Client and server vulnerabilities
- Web security vulnerabilities
- Securing mobile and smart devices
- Understanding encryption
- Key management and public key infrastructure
- Physical security
Skill Level Advanced
1. Security Engineering
2. Cloud Computing and Virtualization
3. Hardware Security
4. Client and Server Vulnerabilities
5. Web Security
6. Mobile Security
7. Smart Device Security
9. Symmetric Cryptography
10. Asymmetric Cryptography
11. Key Management
12. Public Key Infrastructure
13. Cryptanalytic Attacks
14. Physical Security
- Mark as unwatched
- Mark all as unwatched
Are you sure you want to mark all the videos in this course as unwatched?
This will not affect your course history, your reports, or your certificates of completion for this course.Cancel
Take notes with your new membership!
Type in the entry box, then click Enter to save your note.
1:30Press on any video thumbnail to jump immediately to the timecode shown.
Notes are saved with you account but can also be exported as plain text, MS Word, PDF, Google Doc, or Evernote.