General Building and Server Room Security06:52
Door Access10:09
Biometric Readers06:03
Authentication Models07:58
Localized Authentication Technologies06:48
Remote Authentication Technologies06:06
Discretionary Access Control05:33
Mandatory Access Control03:37
Role-Based Access Control (RBAC)02:33
Attribute-based Access Control (ABAC)01:37
Access Control Wise Practices05:18
Users, Groups, and Permissions02:48
Permission Inheritance and Propagation05:58
Usernames and Passwords05:00