LearnKey Training

CISSP Communication and Network Security 2015 Course

CISSP Communication and Network Security 2015 Course

CISSP Communication and Network Security 2015 Course

1 Sessions -
3 Hours of Interactive Training

LearnKey's CISSP Communication and Network Security 2015 course is one of 8 domains making up the Certified Information Systems Security Professional (CISSP) Common Body of Knowledge (CBK). Join LearnKey expert Michael Solomon as he presents information on secure network architecture design, network attacks, secure network components, and secure communication channels. At the conclusion of this course, learners will be familiar with the issues and concepts of the Communication and Network Security knowledge required to pass the CISSP exam.

  • Be up-to-date with training based on the most recent CISSP CBK
  • Interactive labs, and dozens of pre/post test questions
  • View your online courseware anytime, anywhere

About The Author
Michael Solomon, CISSP, PMP®, TICSA, is a speaker, consultant and trainer who specializes in project management and database application-level security topics. Since 1987 Solomon has worked on IT projects or instructed for more than 60 organizations including EarthLink, Nike, Lucent Technologies, BellSouth, UPS, Boart Longyear, and the U.S. Coast Guard. Solomon holds an MS in Computer Science from Emory University (1998), and a BS in Computer Science from Kennesaw State University (1987) where he was also an instructor from 1998 - 2001. He has been a contributor to various certification books.

Session 1

Section A: Local Network Architecture

  • OSI Reference Model
  • Message Migration
  • Application and Presentation Layers
  • Session, Transport, and Network Layers
  • Data-Link and Physical Layers
  • TCP/IP Model
  • Network Protocol Standards

Section B: IP Networking Overview

  • IP Networking
  • Multilayer Protocols
  • Converged Protocols

Section C: Software-Defined

  • Software-Defined Networks
  • Wireless Networks
  • Modulation
  • Wireless Security
  • Cryptography in Communications

Section D: Secure Network Components

  • Network Devices, Hubs
  • Switch
  • Bridge, Router, Gateway
  • Physical Media Characteristics
  • Coaxial and Fiber Optics

Section E: Firewall Architecture

  • Firewall
  • Firewall Types
  • Application Layer Gateway Filter
  • Stateful Inspection
  • Dynamic Filtering and Kernel Proxy
  • Packet Filtering Router, Screened-Host
  • Dual-Homed Host
  • Screened-Subnet (DMZ)
  • Endpoint Security
  • Content Distribution Networks

Section F: Secure Communication Channels

  • Secure Voice Communications
  • Multimedia Collaboration
  • Remote Access, Telecommuting
  • DSL
  • Cable, X.25, Frame Relay, and ATM

Section G: Remote Access Security

  • Virtual Private Network
  • VPN, IPsec, Connection Security
  • Remote Access, Node Authentication

Section H: LAN Topologies

  • Star, Bus, and Ring LAN Topologies
  • Tree, Mesh LAN Topologies

Section I: LAN Access Methods

  • Ethernet
  • ARCNET, Token Ring, FDDI
  • LAN Signaling Types, Remote Access
  • Virtualized Networks
  • Private VLAN and Virtual Network

Section J: Network Attacks

  • Understand Network Attacks
  • Common Attacks
  • DoS, DDoS
  • Flooding, Spoofing
  • Spamming, Eavesdropping, and Sniffers
  • Network Attack Mitigation