Checklist

Certification

You will get a certificate on completing this course.

University

This course is not affiliated with any university.

Price

This course costs very less.

Edvicer's Rewards

You can get a reward of 150 coins on buying this course. These coins can be redeemed for 1 coin= 1Re.

CISSP® - Communications and Network Security

CISSP® - Communications and Network Security

1425
Start anytime
Self paced
English
Course by
PluralsightCourses from Pluralsight
Certificate awarded
Intermediate
Login to earn 150Edvicer reward coin150 coins = INR 150

Limited Time Discount Offers

Save your money with Edvicer. Check out our premium courses with discount offers.

Discount offers - Edvicer

Limited Time Discount Offers

Save your money with Edvicer. Check out our premium courses with discount offers.

Map your Career

Not sure which job profiles this course will open for you? Check out our AI based tool to get a complete personalized career map.

Career Mapper - Edvicer

Map your Career

Not sure which job profiles this course will open for you? Check out our AI based tool to get a complete personalized career map.

Checklist

Certification

You will get a certificate on completing this course.

University

This course is not affiliated with any university.

Price

This course costs very less.

Edvicer's Rewards

You can get a reward of 150 coins on buying this course. These coins can be redeemed for 1 coin= 1Re.

Why should you choose this course?

Description

This course will help you to earn your CISSP® and deep-dive into the Communications and Network Security domain of the Certified Information Systems Security Professional (CISSP®) certification.

Syllabus

Course Overview
CISSP® - Communications and Network Security
What Is Communications and Network Security and What's Next?
Introduction to Secure Network Architecture and Design
Network Security Defined
The Open System Interconnect (OSI) Model
Physical Layer
Data Link Layer
Network Layer
Transport Layer
Session Layer
Presentation Layer
Application Layer
OSI Model vs. TCP/IP Model
Internet Protocol (IP) Networking
IP Classes and CIDR
Ports
Network Topologies
High-level Network Zone Concepts
Common Network Services
Summary and What’s Next
Introduction to Supervisory Control and Data Acquisition
Supervisory Control and Data Acquisition Defined
Components of SCADA
SCADA Security Concerns
Summary and What’s Next
Introduction to Network Protocols
Network Protocols Defined
Storage-focused Network Protocols
Multi-protocol Label Switching (MPLS)
Voice Over Internet Protocol (VoIP)
Wireless Connectivity
Cryptography Defined
Forms of Cryptography
Benefits of Asymmetric Cryptography
Public Key Infrastructure (PKI)
Digital Signatures
Certificate Hierarchies and Chains
Summary and What’s Next
Introduction to Securing Network Components
Securing Network Components Defined
High Security Value Network Components
Routers
Switches
Virtual Private Network (VPN) Concentrators
Modems
Common Transmission Mediums
Common Firewall Types
Packet Filtering Firewalls
Stateful Inspection Firewalls
Application Firewalls
'Next Generation' Firewalls
Address Translation
Proxies
Summary and What’s Next
Introduction to Communication Channels
Circuit vs. Packet Networks
Carrier Sense Multiple Access
Token Passing
Common Layer Two Networking Protocols
Ethernet
Token Ring
Fiber Distributed Data Interface
Wide Area Networking
Integrated Services Digital Network
Asynchronous Transfer Mode
Digital Subscriber Line
Cable Modem
X.25
Frame Relay
T, E, and OC
Common Electronic Communication Methods
Analog vs. Digital
Voice Communication Channel
Email
Instant Messaging and Chat Rooms
Peer to Peer Sharing
Virtual Meetings
Common Virtual Private Network Methods
Point to Point Tunneling Protocol
Layer Two Tunneling Protocol
Internet Protocol Security
Transport Mode vs. Tunnel Mode
Secure Sockets Layering
Common Remote Access Methods
Telnet
rlogin
Secure Shell
Terminal Services
Virtual Local Area Networks
Private VLANs
Secondary VLAN Subtypes
Summary and What’s Next
Introduction to Network Attacks
Themes of Network Attacks
Reconnaissance
Spamming
Spoofing
Packet Manipulation
Session Hijacking
Denial of Service
Tools and Techniques for Network Defense
Intrusion Detection / Prevention Systems
Security Information and Event Management
Vulnerability Management and Penetration Testing
Summary and What’s Next

What others say about this course

You might also be interested in

Write your review of CISSP® - Communications and Network Security

Facebook account of EdvicerLinkedin account of EdvicerInstagram account of Edvicer
Twitter account of EdvicerPinterest account of EdvicerYoutube account of Edvicer