Network & Communications Security

Intermediate
  • 20 videos | 1h 34m 18s
  • Includes Assessment
  • Earns a Badge
Rating 4.6 of 44 users Rating 4.6 of 44 users (44)
Enterprise networks and telecommunications come with unique security challenges. Explore network security best practices for OSI and TCP/IP models, common communication network attacks and countermeasures, and network access control.

WHAT YOU WILL LEARN

  • Distinguish between osi and tcp/ip models and their role in network security issues
    Identify the different types of network topographies and their role in network security
    Describe commonly used ports and protocols and their role in network security
    Describe best practices and benefits of converged communications
    Describe common attacks and countermeasures for protecting telecommunications technologies
    Distinguish between access control and monitoring techniques
    Describe access control standards and protocols
    Describe best practices for remote access operation and configuration
    Describe common network access attacks and appropriate countermeasures
    Describe data plane and control plane separation for managing lan-based security
  • Use segmentation for managing lan-based security
    Identify best practices for secure device management
    Identify best practices for using firewalls and proxies
    Identify best practices for using network intrusion detection and prevention systems
    Identify best practices for using routers and switches securely on networks
    Identify best practices for using traffic-shaping devices
    Identify best practices for secure wireless transmission
    Describe characteristics of wireless security devices
    Identify common attack methods and countermeasures for wireless technologies
    Identify best practices for securing networks, protecting telecommunications technologies, and implementing and operating secure wireless technologies

IN THIS COURSE

  • 5m 27s
  • 5m 55s
  • Locked
    3.  Common Ports and Protocols
    5m 10s
  • Locked
    4.  Converged Communications
    3m 16s
  • Locked
    5.  Communications Network Attacks and Countermeasures
    5m 35s
  • Locked
    6.  Access Control and Monitoring
    5m 18s
  • Locked
    7.  Access Control Standards and Protocols
    8m 45s
  • Locked
    8.  Remote Access Operation and Configuration
    3m 25s
  • Locked
    9.  Network Access Attacks and Countermeasures
    7m 31s
  • Locked
    10.  Plane Separation
    3m 20s
  • Locked
    11.  Segmentation
    6m 25s
  • Locked
    12.  Secure Device Management
    3m 43s
  • Locked
    13.  Firewalls and Proxies
    4m 29s
  • Locked
    14.  Network Intrusion Detection and Prevention Systems
    3m 45s
  • Locked
    15.  Routers and Switches
    4m 52s
  • Locked
    16.  Traffic-shaping Devices
    2m 54s
  • Locked
    17.  Wireless Transmission Security
    3m 18s
  • Locked
    18.  Wireless Security Devices
    3m 4s
  • Locked
    19.  Wireless Technologies Attacks and Countermeasures
    3m 49s
  • Locked
    20.  Exercise: Securing Networks and Communications
    4m 16s

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Rating 4.8 of 17 users Rating 4.8 of 17 users (17)
Rating 4.6 of 22 users Rating 4.6 of 22 users (22)

PEOPLE WHO VIEWED THIS ALSO VIEWED THESE

Rating 4.7 of 292 users Rating 4.7 of 292 users (292)
Rating 4.5 of 82 users Rating 4.5 of 82 users (82)
Rating 4.3 of 81 users Rating 4.3 of 81 users (81)