SSCP Domain : Networks and Telecommunications Part 1

Target Audience
Expected Duration
Lesson Objectives
Course Number

In the fast paced business world of today, secure and reliable communication within your corporation and with outside networks is mandatory. This course covers various aspects of secure digital communications including authentication, data integrity, transport formats and transmission methods. This course teaches the learner about network topology schemes and application and transport layer security protocols such as S/MIME and SSL. It shows how to optimize network level security to protect against DoS attacks using IP addressing techniques and SMTP, ICMP and authentication protocols. The course also examines how to optimize WAN access and security methods and how to maximize physical transmission methods and data integrity in an enterprise environment. This course guides you through the Common Body of Knowledge (CBK) recommended by the International Information Systems Security Certification Consortium (ISC)2 for its Systems Security Certified Practitioner (SSCP) certification. The SSCP credential certifies student expertise in 7 different knowledge domains and covers the most recent key areas of knowledge as outlined in the Candidate Information Bulletin (CIB) effective date: February 1, 2012.

Target Audience
Experienced IT professionals with a basic knowledge of network and communications protocols and equipment seeking to pass the System Security Certified Practitioner (SSCP) exam, or otherwise gain knowledge in assessing, planning, implementing and managing IT security in an enterprise environment. A minimum of one year's professional experience in one of the seven SSCP CBK Domains is required for certification.

Expected Duration (hours)

Lesson Objectives

SSCP Domain : Networks and Telecommunications Part 1

  • recognize the layers of the DoD model
  • describe commonly implemented network topology schemes
  • recognize the features and components of application and transport layer security protocols
  • match IP addressing methods and security features to examples of their use
  • recognize when to use common network layer protocols
  • identify common Network level attacks
  • select an appropriate authentication protocol for a particular scenario
  • specify an appropriate tunneling protocol for a particular scenario
  • assess the network infrastructure security for a given scenario
  • optimize a network level security solution
  • identify optimal SOHO network solutions
  • describe WAN solutions and protocols
  • describe network infrastructure components
  • analyze WAN access and security methods
  • optimize WAN and physical infrastructure transmission and security
  • Course Number: