SSCP Domain : Networks and Telecommunications Part 2

Target Audience
Expected Duration
Lesson Objectives
Course Number

In the fast paced business world of today, secure and reliable communication within your corporation and with outside networks is mandatory. This course covers such topics as authentication and data integrity with a focus on wireless communications and new messaging and exchange technologies. This course teaches the learner how to optimize security standards, policies and procedures for LAN, WAN and WLAN enterprise environment IT infrastructures. The course explains network vulnerabilities, VPNs, the IEEE 802 security standards, IDS solutions and best practices for deploying wireless APs and for configuring firewalls. This course guides you through the Common Body of Knowledge (CBK) recommended by the International Information Systems Security Certification Consortium (ISC)2 for its Systems Security Certified Practitioner (SSCP) certification. The SSCP credential certifies student expertise in 7 different knowledge domains and covers the most recent key areas of knowledge as outlined in the Candidate Information Bulletin (CIB) effective date: February 1, 2012.

Target Audience
Experienced IT professionals with a basic knowledge of network and communications protocols and equipment seeking to pass the System Security Certified Practitioner (SSCP) exam, or otherwise gain knowledge in assessing, planning, implementing and managing IT security in an enterprise environment. A minimum of one year's professional experience in one of the seven SSCP CBK Domains is required for certification.

Expected Duration (hours)

Lesson Objectives

SSCP Domain : Networks and Telecommunications Part 2

  • identify components of a LAN
  • recognize important LAN security considerations
  • describe clientless VPNs
  • describe common firewall types and configuration considerations
  • recognize IDS solutions and monitoring techniques
  • optimize a network enterprise environment security infrastructure
  • describe the most widely used 802.11 standards
  • identify best practices for deploying wireless APs and recognize WLAN security vulnerabilities
  • describe security considerations for WiMAX implementations
  • describe security considerations for Bluetooth connections and mobile networks
  • identify mitigation techniques for RFID and NFC security issues
  • recognize methods of securing wireless networks from outside attacks
  • describe how the use of new technologies can expose an enterprise environment to attack
  • recognize how to secure the seven domains of an IT infrastructure
  • recognize security countermeasures that can be implemented in a network environment
  • optimize an enterprise environment WLAN security infrastructure
  • optimize security standards, policies and procedures for an enterprise environment
  • Course Number: