Vi ste ovdje
CISSP 2013 Domain: Telecommunications and Network Security
Overview/Description
Access to a company's resources through unauthorized means is the number one goal of most attackers. The security professional must understand the proper countermeasures in order to stop attacks on e-mail systems, over the network, and on the PBX. This course discusses the transport mechanisms, structures, and security measures used to ensure availability, confidentiality, integrity, and authentication over both public and private networks. This course guides you through the Common Body of Knowledge (CBK) recommended by the International Information Systems Security Certification Consortium (ISC2) for its Certified Information Systems Security Professional (CISSP) certification. The CISSP credential certifies student expertise in ten different knowledge domains.
Target Audience
The CISSP credential is ideal for mid- and senior-level managers who are working toward or have already attained positions as CISOs, CSOs, or Senior Security Engineers.
Expected Duration (hours)
3.5
Lesson Objectivesrecognize the components of a network infrastructure
identify the key features of firewall technologies
identify the characteristics of TCP/IP
match the layers of the OSI model to their functions
recognize how specific network attack techniques operate
propose a high level security solution for a given scenario
define how networks interact
specify the type of cable to use in a given scenario
recognize LAN transmission considerations
identify network topology characteristics
recognize features of media access technologies
classify statements as characteristics of either synchronous and asynchronous communications
recognize LAN and WAN specific devices and technologies
match the technologies used by packet-switched networks to their descriptions
match the remote access protocols to their functions
identify the characteristics of Ethernet
recognize how data is transmitted in Token Ring networks
recognize the characteristics of the network communications mechanisms and technologies used in an enterprise environment
identify currently available VPN protocols
specify the most appropriate network components for a given scenario
propose a network communication solution for a given scenario
match the network protocols to their descriptions
recognize how transport layer mechanisms secure network data
recognize how different technologies are used to protect data at the application layer
identify how to secure network communications in a given scenario
distinguish between the technologies that secure the transport and application layers
Access to a company's resources through unauthorized means is the number one goal of most attackers. The security professional must understand the proper countermeasures in order to stop attacks on e-mail systems, over the network, and on the PBX. This course discusses the transport mechanisms, structures, and security measures used to ensure availability, confidentiality, integrity, and authentication over both public and private networks. This course guides you through the Common Body of Knowledge (CBK) recommended by the International Information Systems Security Certification Consortium (ISC2) for its Certified Information Systems Security Professional (CISSP) certification. The CISSP credential certifies student expertise in ten different knowledge domains.
Target Audience
The CISSP credential is ideal for mid- and senior-level managers who are working toward or have already attained positions as CISOs, CSOs, or Senior Security Engineers.
Expected Duration (hours)
3.5
Lesson Objectives
CISSP 2013 Domain: Telecommunications and Network Security
Trajanje:
3,5 h
Šifra:
sp_cptf_a02_it_enus
Katalog: