CISSP Cert Prep (2021): 4 Communication and Network Security
Offered By: LinkedIn Learning
Course Description
Overview
Prepare for the Communications and Network Security domain of the CISSP exam. Learn about best practices for TCP/IP networking, network security devices, network attacks, and more.
Syllabus
Introduction
- Communication and network security
- What you need to know
- Study resources
- Introducing TCP/IP
- IP addresses and DHCP
- Domain name system (DNS)
- Network ports
- ICMP
- Multilayer protocols
- Public and private addressing
- Subnetting
- Security zones
- VLANs and network segmentation
- Security device placement
- Software-defined networking (SDN)
- Transmission media
- Routers, switches, and bridges
- Firewalls
- Proxy servers
- Load balancers
- VPNs and VPN concentrators
- Network intrusion detection and prevention
- Protocol analyzers
- Unified threat management
- Content distribution networks
- Restricting network access
- Network access control
- Firewall rule management
- Router configuration security
- Switch configuration security
- Maintaining network availability
- Network monitoring
- SNMP
- Isolating sensitive systems
- Deception technologies
- Network support
- Telephony
- Multimedia collaboration
- Storage networks
- TLS and SSL
- IPsec
- Remote network access
- Securing common protocols
- Understanding wireless networking
- Wireless encryption
- Wireless authentication
- Wireless signal propagation
- Wireless networking equipment
- Mobile connection methods
- Mobile device security
- Mobile device management
- Mobile device tracking
- Mobile application security
- Mobile security enforcement
- Bring your own device (BYOD)
- Mobile deployment models
- Operating system security
- Malware prevention
- Application management
- Host-based network security controls
- File integrity monitoring
- Data loss prevention
- Continuing your preparation
Taught by
Mike Chapple
Related Courses
Computer SecurityStanford University via Coursera Cryptography II
Stanford University via Coursera Malicious Software and its Underground Economy: Two Sides to Every Story
University of London International Programmes via Coursera Building an Information Risk Management Toolkit
University of Washington via Coursera Introduction to Cybersecurity
National Cybersecurity Institute at Excelsior College via Canvas Network