CISSP® - Communications and Network Security
This course will help you to earn your CISSP® and deep-dive into the Communications and Network Security domain of the Certified Information Systems Security Professional (CISSP®) certification.
What you'll learn
If you want to learn practical communications and network security skills while preparing for your CISSP®, this course will show you how! Deep dive into the Communications and Network Security domain of the Certified Information Systems Security Professional (CISSP®) certification. You'll gain knowledge and skills in the areas of secure network architecture and design as well as supervisory control and data acquisition (SCADA). Next, you'll go over network protocols and securing their components. Finally, you'll learn more about communication channels and network attacks. By the end of this course, you will be more prepared for the CISSP exam and you'll also be more knowledgeable when it comes to communications and network security.
Table of contents
- Introduction to Secure Network Architecture and Design 1m
- Network Security Defined 1m
- The Open System Interconnect (OSI) Model 0m
- Physical Layer 0m
- Data Link Layer 1m
- Network Layer 1m
- Transport Layer 1m
- Session Layer 0m
- Presentation Layer 0m
- Application Layer 1m
- OSI Model vs. TCP/IP Model 1m
- Internet Protocol (IP) Networking 2m
- IP Classes and CIDR 2m
- Ports 1m
- Network Topologies 2m
- High-level Network Zone Concepts 3m
- Common Network Services 2m
- Summary and What’s Next 1m
- Introduction to Network Protocols 1m
- Network Protocols Defined 1m
- Storage-focused Network Protocols 1m
- Multi-protocol Label Switching (MPLS) 1m
- Voice Over Internet Protocol (VoIP) 1m
- Wireless Connectivity 3m
- Cryptography Defined 1m
- Forms of Cryptography 2m
- Benefits of Asymmetric Cryptography 1m
- Public Key Infrastructure (PKI) 1m
- Digital Signatures 1m
- Certificate Hierarchies and Chains 2m
- Summary and What’s Next 1m
- Introduction to Securing Network Components 1m
- Securing Network Components Defined 1m
- High Security Value Network Components 0m
- Routers 1m
- Switches 1m
- Virtual Private Network (VPN) Concentrators 1m
- Modems 1m
- Common Transmission Mediums 1m
- Common Firewall Types 0m
- Packet Filtering Firewalls 1m
- Stateful Inspection Firewalls 1m
- Application Firewalls 1m
- 'Next Generation' Firewalls 1m
- Address Translation 1m
- Proxies 1m
- Summary and What’s Next 1m
- Introduction to Communication Channels 1m
- Circuit vs. Packet Networks 1m
- Carrier Sense Multiple Access 1m
- Token Passing 0m
- Common Layer Two Networking Protocols 0m
- Ethernet 1m
- Token Ring 0m
- Fiber Distributed Data Interface 1m
- Wide Area Networking 0m
- Integrated Services Digital Network 1m
- Asynchronous Transfer Mode 1m
- Digital Subscriber Line 1m
- Cable Modem 1m
- X.25 1m
- Frame Relay 1m
- T, E, and OC 1m
- Common Electronic Communication Methods 0m
- Analog vs. Digital 1m
- Voice Communication Channel 2m
- Email 1m
- Instant Messaging and Chat Rooms 1m
- Peer to Peer Sharing 1m
- Virtual Meetings 1m
- Common Virtual Private Network Methods 0m
- Point to Point Tunneling Protocol 0m
- Layer Two Tunneling Protocol 0m
- Internet Protocol Security 1m
- Transport Mode vs. Tunnel Mode 1m
- Secure Sockets Layering 1m
- Common Remote Access Methods 0m
- Telnet 1m
- rlogin 1m
- Secure Shell 1m
- Terminal Services 1m
- Virtual Local Area Networks 1m
- Private VLANs 1m
- Secondary VLAN Subtypes 1m
- Summary and What’s Next 1m
- Introduction to Network Attacks 1m
- Themes of Network Attacks 0m
- Reconnaissance 1m
- Spamming 0m
- Spoofing 2m
- Packet Manipulation 1m
- Session Hijacking 1m
- Denial of Service 2m
- Tools and Techniques for Network Defense 0m
- Intrusion Detection / Prevention Systems 2m
- Security Information and Event Management 1m
- Vulnerability Management and Penetration Testing 1m
- Summary and What’s Next 1m