CISSP: Telecommunications Security (replaced by course sp_cssp_a10_it_enus)

This course is included in our On-demand training solution.

Overview

To understand the structures, transmission methods, transport formats, and security technologies used in providing telecommunications and network security; to prepare candidates for one of the ten knowledge domains assessed in (ISC)2’s CISSP certification exam

Target Audience

Mid-level and senior-level managers who are working toward or have already attained positions as CISOs, CSOs or Senior Security Engineers

Prerequisites

A minimum of four years of professional experience in the information security field or three years plus a college degree

Expected Duration

220 min.

Course Objectives

CISSP: Telecommunications Security (replaced by course sp_cssp_a10_it_enus)

  • identify security issues associated with e-mail, facsimile, and PBX systems, and recognize how the LPC algorithm is used to secure voice communications.
  • identify the characteristics and functionality of the different technologies used to protect an organization at the network edge.
  • identify the characteristics of TCP and IP, and recognize the functionality of the OSI reference model.
  • distinguish between the layers of the OSI reference model and their associated functionality and technologies.
  • distinguish between types of data topology and physical media, and recognize the functionality of different LAN technologies.
  • recognize the network topologies, media access methods, data transmission types, and devices used by LANs and WANs.
  • identify the characteristics of the switching, remote access, and authentication methods used by LANs and WANs, and recognize the functionality of Ethernet and Token Ring technologies.
  • recognize the characteristics of the various network communications mechanisms and technologies used in an enterprise environment, and identify the protocols used by VPNs.
  • recognize the characteristics and functionality of the protocols used to secure data in transit in an enterprise environment.
  • recognize how different transport layer mechanisms secure network data.
  • recognize how different technologies are used to protect data at the Application layer.
  • determine the most appropriate methods and mechanisms for securing information at the Application layer, given a scenario.
  • SUBSCRIPTION COST



     

    NEED HELP OR NOT SURE?