Enterprise networks and telecommunications technology, while vital, come with their own unique security challenges. This course introduces network security best practices for OSI and TCP/IP models, as well as common ports and protocols. It also covers common communication network attacks and countermeasures, as well as network access control best practices. In this course, you will learn about secure practices for managing LAN-based, network-based, and wireless platforms technologies. This course is one of a series in the Skillsoft learning path that covers the objectives for the (ISC)2 Systems Security Certified Practitioner exam.
Learning Objectives
Understanding Network Security Issues
- start the course
- distinguish between OSI and TCP/IP models and their role in network security issues
- identify the different types of network topographies and their role in network security
- describe commonly used ports and protocols and their role in network security
Protecting Telecommunications Technologies
- describe best practices and benefits of converged communications
- describe common attacks and countermeasures for protecting telecommunications technologies
Controlling Network Access
- distinguish between access control and monitoring techniques
- describe access control standards and protocols
- describe best practices for remote access operation and configuration
- describe common network access attacks and appropriate countermeasures
Managing LAN-based Security
- describe data plane and control plane separation for managing LAN-based security
- use segmentation for managing LAN-based security
- identify best practices for secure device management
Operating Network-based Security Devices
- identify best practices for using firewalls and proxies
- identify best practices for using network intrusion detection and prevention systems
- identify best practices for using routers and switches securely on networks
- identify best practices for using traffic-shaping devices
Implementing Wireless Technologies
- identify best practices for secure wireless transmission
- describe characteristics of wireless security devices
- identify common attack methods and countermeasures for wireless technologies
Practice: Network & Communications Security
- identify best practices for securing networks, protecting telecommunications technologies, and implementing and operating secure wireless technologies