Systems Security Certified Practitioner: Network and Communications Security


Overview/Description
Target Audience
Prerequisites
Expected Duration
Lesson Objectives
Course Number
Expertise Level



Overview/Description
Enterprise networks and telecommunications technology, while vital, come with their own unique security challenges. This course introduces network security best practices for OSI and TCP/IP models, as well as common ports and protocols. It also covers common communication network attacks and countermeasures, as well as network access control best practices. In this course, you will learn about secure practices for managing LAN-based, network-based, and wireless platforms technologies. This course is one of a series in the Skillsoft learning path that covers the objectives for the (ISC)2 Systems Security Certified Practitioner exam.

Target Audience
Individuals interested in the (ISC)2 Systems Security Certified Practitioner exam; security professionals interested in acquiring new skills and knowledge in security best practices

Prerequisites
None

Expected Duration (hours)
1.7

Lesson Objectives

Systems Security Certified Practitioner: Network and Communications Security

  • start the course
  • distinguish between OSI and TCP/IP models and their role in network security issues
  • identify the different types of network topographies and their role in network security
  • describe commonly used ports and protocols and their role in network security
  • describe best practices and benefits of converged communications
  • describe common attacks and countermeasures for protecting telecommunications technologies
  • distinguish between access control and monitoring techniques
  • describe access control standards and protocols
  • describe best practices for remote access operation and configuration
  • describe common network access attacks and appropriate countermeasures
  • describe data plane and control plane separation for managing LAN-based security
  • use segmentation for managing LAN-based security
  • identify best practices for secure device management
  • identify best practices for using firewalls and proxies
  • identify best practices for using network intrusion detection and prevention systems
  • identify best practices for using routers and switches securely on networks
  • identify best practices for using traffic-shaping devices
  • identify best practices for secure wireless transmission
  • describe characteristics of wireless security devices
  • identify common attack methods and countermeasures for wireless technologies
  • identify best practices for securing networks, protecting telecommunications technologies, and implementing and operating secure wireless technologies
  • Course Number:
    sp_sscp_a07_it_enus

    Expertise Level
    Beginner