SSCP Domain : Networks and Telecommunications Part 2

This course is included in our On-demand training solution.


In the fast paced business world of today, secure and reliable communication within your corporation and with outside networks is mandatory. This course covers such topics as authentication and data integrity with a focus on wireless communications and new messaging and exchange technologies. This course teaches the learner how to optimize security standards, policies and procedures for LAN, WAN and WLAN enterprise environment IT infrastructures. The course explains network vulnerabilities, VPNs, the IEEE 802 security standards, IDS solutions and best practices for deploying wireless APs and for configuring firewalls. This course guides you through the Common Body of Knowledge (CBK) recommended by the International Information Systems Security Certification Consortium (ISC)2 for its Systems Security Certified Practitioner (SSCP) certification. The SSCP credential certifies student expertise in 7 different knowledge domains.

Target Audience

Experienced IT professionals with a basic knowledge of network and communications protocols and equipment seeking to pass the System Security Certified Practitioner (SSCP) exam, or otherwise gain knowledge in assessing, planning, implementing and managing IT security in an enterprise environment. A minimum of one year’s professional experience in one of the seven SSCP CBK Domains is required for certification.


Expected Duration

150 min.

Course Objectives

Enterprise Network Vulnerabilities

  • identify components of a LAN
  • recognize important LAN security considerations
  • Remote User Identification and Authentication

  • describe clientless VPNs
  • Selecting and Configuring Firewalls

  • describe common firewall types and configuration considerations
  • Intrusion Detection Systems

  • recognize IDS solutions and monitoring techniques
  • Network Vulnerabilities and Remote Users

    IEEE 802 Standards for Wireless LAN

  • describe the most widely used 802.11 standards
  • Wireless Access and Vulnerabilities

  • identify best practices for deploying wireless APs and recognize WLAN security vulnerabilities
  • Wireless Technologies

  • describe security considerations for WiMAX implementations
  • describe security considerations for Bluetooth connections and mobile networks
  • identify mitigation techniques for RFID and NFC security issues
  • Wireless LAN Security

  • recognize methods of securing wireless networks from outside attacks
  • New Technologies, Standards, and Procedures

  • describe how the use of new technologies can expose an enterprise environment to attack
  • recognize how to secure the seven domains of an IT infrastructure
  • recognize security countermeasures that can be implemented in a network environment
  • Wi-Fi Security and New Technology