Systems Security Certified Practitioner: Network and Communications Security

Individuals interested in the (ISC)2 Systems Security Certified Practitioner exam; security professionals interested in acquiring new skills and knowledge in security best practices


Expected Duration
102 minutes

Enterprise networks and telecommunications technology, while vital, come with their own unique security challenges. This course introduces network security best practices for OSI and TCP/IP models, as well as common ports and protocols. It also covers common communication network attacks and countermeasures, as well as network access control best practices. In this course, you will learn about secure practices for managing LAN-based, network-based, and wireless platforms technologies. This course is one of a series in the Skillsoft learning path that covers the objectives for the (ISC)2 Systems Security Certified Practitioner exam.


Understanding Network Security Issues

  • start the course
  • distinguish between OSI and TCP/IP models and their role in network security issues
  • identify the different types of network topographies and their role in network security
  • describe commonly used ports and protocols and their role in network security

Protecting Telecommunications Technologies

  • describe best practices and benefits of converged communications
  • describe common attacks and countermeasures for protecting telecommunications technologies

Controlling Network Access

  • distinguish between access control and monitoring techniques
  • describe access control standards and protocols
  • describe best practices for remote access operation and configuration
  • describe common network access attacks and appropriate countermeasures

Managing LAN-based Security

  • describe data plane and control plane separation for managing LAN-based security
  • use segmentation for managing LAN-based security
  • identify best practices for secure device management

Operating Network-based Security Devices

  • identify best practices for using firewalls and proxies
  • identify best practices for using network intrusion detection and prevention systems
  • identify best practices for using routers and switches securely on networks
  • identify best practices for using traffic-shaping devices

Implementing Wireless Technologies

  • identify best practices for secure wireless transmission
  • describe characteristics of wireless security devices
  • identify common attack methods and countermeasures for wireless technologies

Practice: Network & Communications Security

  • identify best practices for securing networks, protecting telecommunications technologies, and implementing and operating secure wireless technologies





Multi-license discounts available for Annual and Monthly subscriptions.