CISSP: Communication & Network Security Design

Individuals interested in information systems security concepts, methodologies and best practices; candidates for the Certified Information Systems Security Professional (CISSP) exam


Expected Duration
119 minutes

Securing network communications is a key activity in managing the security of any IT system, and the network is a common and potent vector for attack. In this course, you’ll learn about the design and components of network systems, how to implement secure systems, and how to mitigate common attacks. This course is one of a series in the Skillsoft learning path that covers the objectives for the Certified Information Systems Security Professional (CISSP) exam.


Apply Secure Design Principles

  • start the course
  • describe the TCP/IP and the OSI network models
  • describe the IP protocol
  • describe common protocols and their layer in the relevant models
  • describe protocol convergence and common protocols for converging voice and video on IP networks
  • describe wireless networking and the options for securing wireless networks
  • identify common cryptographic protocols used for communications

Secure Network Components

  • describe security of networks and hardware network design security considerations
  • describe the security characteristic of different choices of network media
  • describe network access control and the components of a NAC system
  • describe local on-device security for network end systems
  • describe content-distribution networks and their security implications

Secure Communication Channels

  • describe security options for voice channel in converged and non-converged networks
  • identify options for securing multimedia channels in the network
  • describe remote access options and security considerations for the network
  • identify remote management and users technologies used in network environments
  • identify network types and describe data communication on a network
  • describe the concept of virtualized networks

Managing Network Security

  • describe network security management techniques
  • describe distributed denial of service attacks and identify mitigation strategies
  • describe spoofing and vulnerability attacks and identify mitigation strategies

Practice: Networks and Attacks

  • describe networks and strategies for securing them





Multi-license discounts available for Annual and Monthly subscriptions.