Overview/Description
To understand the structures, transmission methods, transport formats, and security technologies used in providing telecommunications and network security; to prepare candidates for one of the ten knowledge domains assessed in (ISC)2's CISSP certification exam
Target Audience
Mid-level and senior-level managers who are working toward or have already attained positions as CISOs, CSOs or Senior Security Engineers
Prerequisites
A minimum of four years of professional experience in the information security field or three years plus a college degree
CISSP: Telecommunications Security (replaced by course sp_cssp_a10_it_enus)
identify security issues associated with e-mail, facsimile, and PBX systems, and recognize how the LPC algorithm is used to secure voice communications.
identify the characteristics and functionality of the different technologies used to protect an organization at the network edge.
identify the characteristics of TCP and IP, and recognize the functionality of the OSI reference model.
distinguish between the layers of the OSI reference model and their associated functionality and technologies.
distinguish between types of data topology and physical media, and recognize the functionality of different LAN technologies.
recognize the network topologies, media access methods, data transmission types, and devices used by LANs and WANs.
identify the characteristics of the switching, remote access, and authentication methods used by LANs and WANs, and recognize the functionality of Ethernet and Token Ring technologies.
recognize the characteristics of the various network communications mechanisms and technologies used in an enterprise environment, and identify the protocols used by VPNs.
recognize the characteristics and functionality of the protocols used to secure data in transit in an enterprise environment.
recognize how different transport layer mechanisms secure network data.
recognize how different technologies are used to protect data at the Application layer.
determine the most appropriate methods and mechanisms for securing information at the Application layer, given a scenario.