CISSP Domain – Telecommunications and Network Security

This course is included in our On-demand training solution.

Overview

Access to a company’s resources through unauthorized means is the number one goal of most attackers. The security professional must understand the proper countermeasures in order to stop attacks on e-mail systems, over the network, and on the PBX. This course discusses the transport mechanisms, structures, and security measures used to ensure availability, confidentiality, integrity, and authentication over both public and private networks. This course guides you through the Common Body of Knowledge (CBK) recommended by the International Information Systems Security Certification Consortium (ISC2) for its Certified Information Systems Security Professional (CISSP) certification. The CISSP credential certifies student expertise in ten different knowledge domains.

Target Audience

The CISSP credential is ideal for mid- and senior-level managers who are working toward or have already attained positions as CISOs, CSOs, or Senior Security Engineers.

Prerequisites

Expected Duration

210 min.

Course Objectives

Internet, Intranet, and Extranet Security

  • recognize the components of a network infrastructure
  • identify the key features of firewall technologies
  • TCP/IP and OSI Model

  • identify the characteristics of TCP/IP
  • match the layers of the OSI model to their functions
  • recognize how specific network attack techniques operate
  • Network Framework and Transportation Principles

    Data Topologies, Physical Media, and LAN Technologies

  • specify the type of cable to use in a given scenario
  • recognize LAN transmission considerations
  • Networks, Access Methods, Transmissions, and Devices

  • identify network topology characteristics
  • recognize features of media access technologies
  • classify statements as characteristics of either synchronous and asynchronous communications
  • recognize LAN and WAN specific devices and technologies
  • Switching, Remote Access, Ethernet, and Token Ring

  • match the technologies used by packet-switched networks to their descriptions
  • match the remote access protocols to their functions
  • identify the characteristics of Ethernet
  • recognize how data is transmitted in Token Ring networks
  • Network Communication and VPNs

  • recognize the characteristics of the network communications mechanisms and technologies used in an enterprise environment
  • identify currently available VPN protocols
  • Network Access Methods and Communication

    Security at the Network and Transport Layers

  • match the network protocols to their descriptions
  • recognize how transport layer mechanisms secure network data
  • Security at the Application Layer

  • recognize how different technologies are used to protect data at the application layer
  • Securing the Upper OSI layers

    SUBSCRIPTION COST



     

    NEED HELP OR NOT SURE?