Author
Updated
8/28/2020Released
4/4/2018- How IP addresses are assigned and managed
- Multilayer protocols
- VPNs and VPN concentrators
- Designing secure networks
- Firewall management techniques
- Maintaining network availability
- Software defined networking (SDN)
- Port isolation
- Network attacks
- How Wi-Fi networks function
- WPA, WPS, and propagation attacks
- Host-based network security control
Skill Level Advanced
Duration
Views
- Hi, I'm Mike Chapple, and I'd like to welcome you to our CISSP communication and network security course. The Certified Information Systems Security Professional, or CISSP certification, is the gold standard for information security certification. You'll find that it's a core requirement for many mid and senior-level information security positions. Earning the CISSP requires demonstrating that you have sufficient work experience and passing an exam covering the eight domains of information security. This course covers the fourth of those eight domains, communication and network security. 14% of the questions on the CISSP exam come from this domain. I have two decades of experience as an information security professional, and I've been involved in CISSP training and certification for most of those. As you work your way through this course, you might find it helpful to have two books that I've written by your side. The first is the official CISSP study guide available from Cybex. This book is approved by the International Information System Security Certification Consortium as the official study guide for the exam. And it contains context that supplements this course and will help you be prepared when you take the test. The second book you'll want are the official CISSP practice tests, also available from Cybex. This book contains 1300 practice exam questions designed to mimic those on the actual test. It has an entire chapter dedicated to questions from each domain, along with two full-length practice tests to help you assess your progress. As we work our way through this course, we will focus on each topic covered by domain four. We'll review how to apply secure design principles to network architecture. We'll also cover securing network components and communications channels. You'll learn how you can prevent or mitigate network attacks. And that's just a small sampling of the many topics covered in this course. These topics, combined with the information you learn in our other CISSP courses, will help you pass the CISSP exam and also provide a critical foundation for your career in information security. In addition to using this course and the companion books to prepare for the exam, I encourage you to visit my website at certmike.com, and sign up for my free CISSP study group. I'll send you weekly emails, guiding you through the exam preparation process and offer you test-taking tips to get you ready for the exam. All right, let's get rolling.
Related Courses
-
Insights from a Cybersecurity Professional
with Mike Chapple32m 15s Intermediate
-
Introduction
-
Secure your network2m 35s
-
-
1. TCP/IP Networking
-
Introducing TCP/IP6m 22s
-
IP addressing3m 26s
-
Domain Name System (DNS)4m 28s
-
Network ports3m 41s
-
ICMP5m 38s
-
Multilayer protocols2m 38s
-
-
2. Network Security Devices
-
Switches and routers2m 31s
-
Firewalls4m 20s
-
VPNs and VPN concentrators2m 55s
-
Protocol analyzers6m 39s
-
Unified threat management1m 54s
-
Modems2m 24s
-
-
3. Designing Secure Networks
-
Subnetting3m 46s
-
Network access control4m 21s
-
Remote network access5m 18s
-
Defense in depth3m 26s
-
4. Specialized Networking
-
Telephony2m 24s
-
Multimedia collaboration5m 5s
-
Storage networks3m 24s
-
MPLS3m 50s
-
-
5. Secure Network Management
-
Firewall rule management4m 41s
-
Network monitoring4m 19s
-
SNMP3m 18s
-
-
6. Virtualized Networks
-
Port isolation1m 47s
-
7. Network Attacks
-
Denial-of-service attacks4m 25s
-
Eavesdropping attacks3m 51s
-
Other network attacks5m 56s
-
-
8. Transport Encryption
-
TLS and SSL4m 1s
-
IPsec3m
-
Securing common protocols6m 30s
-
-
9. Wireless Networking
-
Basic wireless security3m 53s
-
WEP, WPA, and WPA21m 44s
-
Wireless authentication4m 58s
-
Wireless signal propagation2m 47s
-
WPA and WPS attacks3m 30s
-
Propagation attacks3m 42s
-
10. Host Security
-
Malware prevention8m 54s
-
Application management6m 49s
-
Hardware security4m 13s
-
Virtualization security5m 47s
-
Conclusion
-
Next steps44s
-
- Mark as unwatched
- Mark all as unwatched
Are you sure you want to mark all the videos in this course as unwatched?
This will not affect your course history, your reports, or your certificates of completion for this course.
CancelTake notes with your new membership!
Type in the entry box, then click Enter to save your note.
1:30Press on any video thumbnail to jump immediately to the timecode shown.
Notes are saved with you account but can also be exported as plain text, MS Word, PDF, Google Doc, or Evernote.
Share this video
Embed this video
Video: Secure your network