Network & Communications Security
Intermediate, expert
- 20 Videos | 1h 34m 18s
- Includes Assessment
- Earns a Badge
Enterprise networks and telecommunications come with unique security challenges. Explore network security best practices for OSI and TCP/IP models, common communication network attacks and countermeasures, and network access control.
WHAT YOU WILL LEARN
-
distinguish between OSI and TCP/IP models and their role in network security issuesidentify the different types of network topographies and their role in network securitydescribe commonly used ports and protocols and their role in network securitydescribe best practices and benefits of converged communicationsdescribe common attacks and countermeasures for protecting telecommunications technologiesdistinguish between access control and monitoring techniquesdescribe access control standards and protocolsdescribe best practices for remote access operation and configurationdescribe common network access attacks and appropriate countermeasuresdescribe data plane and control plane separation for managing LAN-based security
-
use segmentation for managing LAN-based securityidentify best practices for secure device managementidentify best practices for using firewalls and proxiesidentify best practices for using network intrusion detection and prevention systemsidentify best practices for using routers and switches securely on networksidentify best practices for using traffic-shaping devicesidentify best practices for secure wireless transmissiondescribe characteristics of wireless security devicesidentify common attack methods and countermeasures for wireless technologiesidentify best practices for securing networks, protecting telecommunications technologies, and implementing and operating secure wireless technologies
IN THIS COURSE
-
1.OSI and TCP/IP Models5m 27sUP NEXT
-
2.Network Topographies and Relationships5m 55s
-
3.Common Ports and Protocols5m 10s
-
4.Converged Communications3m 16s
-
5.Communications Network Attacks and Countermeasures5m 35s
-
6.Access Control and Monitoring5m 18s
-
7.Access Control Standards and Protocols8m 45s
-
8.Remote Access Operation and Configuration3m 25s
-
9.Network Access Attacks and Countermeasures7m 31s
-
10.Plane Separation3m 20s
-
11.Segmentation6m 25s
-
12.Secure Device Management3m 43s
-
13.Firewalls and Proxies4m 29s
-
14.Network Intrusion Detection and Prevention Systems3m 45s
-
15.Routers and Switches4m 52s
-
16.Traffic-shaping Devices2m 54s
-
17.Wireless Transmission Security3m 18s
-
18.Wireless Security Devices3m 4s
-
19.Wireless Technologies Attacks and Countermeasures3m 49s
-
20.Exercise: Securing Networks and Communications4m 16s
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion of this course, which can be shared on any social network or business platform
Digital badges are yours to keep, forever.