• Online, Self-Paced
Course Description

Enterprise networks and telecommunications technology, while vital, come with their own unique security challenges. This course introduces network security best practices for OSI and TCP/IP models, as well as common ports and protocols. It also covers common communication network attacks and countermeasures, as well as network access control best practices. In this course, you will learn about secure practices for managing LAN-based, network-based, and wireless platforms technologies. This course is one of a series in the Skillsoft learning path that covers the objectives for the (ISC)2 Systems Security Certified Practitioner exam.

Learning Objectives

Understanding Network Security Issues

  • start the course
  • distinguish between OSI and TCP/IP models and their role in network security issues
  • identify the different types of network topographies and their role in network security
  • describe commonly used ports and protocols and their role in network security

Protecting Telecommunications Technologies

  • describe best practices and benefits of converged communications
  • describe common attacks and countermeasures for protecting telecommunications technologies

Controlling Network Access

  • distinguish between access control and monitoring techniques
  • describe access control standards and protocols
  • describe best practices for remote access operation and configuration
  • describe common network access attacks and appropriate countermeasures

Managing LAN-based Security

  • describe data plane and control plane separation for managing LAN-based security
  • use segmentation for managing LAN-based security
  • identify best practices for secure device management

Operating Network-based Security Devices

  • identify best practices for using firewalls and proxies
  • identify best practices for using network intrusion detection and prevention systems
  • identify best practices for using routers and switches securely on networks
  • identify best practices for using traffic-shaping devices

Implementing Wireless Technologies

  • identify best practices for secure wireless transmission
  • describe characteristics of wireless security devices
  • identify common attack methods and countermeasures for wireless technologies

Practice: Network & Communications Security

  • identify best practices for securing networks, protecting telecommunications technologies, and implementing and operating secure wireless technologies

Framework Connections

The materials within this course focus on the NICE Framework Task, Knowledge, and Skill statements identified within the indicated NICE Framework component(s):

Specialty Areas

  • Cybersecurity Management
  • Systems Analysis
  • Systems Architecture