CISSP: Communication & Network Security Design


Overview/Description
Target Audience
Prerequisites
Expected Duration
Lesson Objectives
Course Number
Expertise Level



Overview/Description
Securing network communications is a key activity in managing the security of any IT system, and the network is a common and potent vector for attack. In this course, you'll learn about the design and components of network systems, how to implement secure systems, and how to mitigate common attacks. This course is one of a series in the Skillsoft learning path that covers the objectives for the Certified Information Systems Security Professional (CISSP) exam.

Target Audience
Individuals interested in information systems security concepts, methodologies and best practices; candidates for the Certified Information Systems Security Professional (CISSP) exam

Prerequisites
None

Expected Duration (hours)
2.0

Lesson Objectives

CISSP: Communication & Network Security Design

  • start the course
  • describe the TCP/IP and the OSI network models
  • describe the IP protocol
  • describe common protocols and their layer in the relevant models
  • describe protocol convergence and common protocols for converging voice and video on IP networks
  • describe wireless networking and the options for securing wireless networks
  • identify common cryptographic protocols used for communications
  • describe security of networks and hardware network design security considerations
  • describe the security characteristic of different choices of network media
  • describe network access control and the components of a NAC system
  • describe local on-device security for network end systems
  • describe content-distribution networks and their security implications
  • describe security options for voice channel in converged and non-converged networks
  • identify options for securing multimedia channels in the network
  • describe remote access options and security considerations for the network
  • identify remote management and users technologies used in network environments
  • identify network types and describe data communication on a network
  • describe the concept of virtualized networks
  • describe network security management techniques
  • describe distributed denial of service attacks and identify mitigation strategies
  • describe spoofing and vulnerability attacks and identify mitigation strategies
  • describe networks and strategies for securing them
  • Course Number:
    sp_cisp_a06_it_enus

    Expertise Level
    Intermediate