The Legend of Zelda Breath of the Wild [FitGirl Repack] | The Samurai of Ayothaya (2010) | Lethal Weapon
» » LearnKey - CISSP Telecommunications, Network & Internet Security

LearnKey - CISSP Telecommunications, Network & Internet Security


LearnKey - CISSP Telecommunications, Network & Internet Security
LearnKey - CISSP: Telecommunications, Network & Internet Security
English | Size: 219.32 MB
Category: Video Training

Telecommunications, Network & Internet Security is one of 10 domains comprising the Certified Information Systems Security Professional (CISSP) Common Body of Knowledge (CBK). In this CISSP certification prep course from LearnKey, expert instructor Michael Solomon discusses LAN technologies, devices and architectures, as well as network security techniques, security protocols and common network attacks. At the conclusion of this course, you will be familiar with the issues and concepts of the Telecommunications, Network & Internet Security domain required to pass the CISSP exam.




Session 1
Section A: OSI Reference Model
· Protocols
· Standards Organization
· OSI Review
· Logical Data Flow
· Physical Data Flow

Section B: OSI Layers
· Application Layer
· Presentation Layer
· Session Layer
· Transport Layer
· Network Layer
· Data Link Layer
· Physical Layer

Section C: Physical Media & LAN Technologies
· Twisted Pair
· Coaxial
· Fiber Optics
· Star Topology
· Bus Topology
· Ring Topology
· Tree Topology
· Mesh Topology

Section D: LANs, WANs, & Remote Access
· Ethernet
· Other Access Methods
· Signaling Types
· Network Types
· Dialup
· ISDN
· DSL
· Wireless/Cable

Section E: Remote Access Security
· VPN
· PPTP
· IPSec
· Connection Security
· User Authentication
· Node Authentication

Session 2
Section A: Network Devices
· Hubs
· Bridges
· Switches
· Routers
· Gateways
· Firewalls

Section B: Firewalls
· 1st Generation
· 2nd & 3rd Generation
· 4th & 5th Generation
· Packet-Filtering Router
· Screened-host
· Dual-homed Host
· Screened-subnet

Section C: Security Protocols & Services
· TCP/IP
· Network Layer
· Transport Layer
· Application Layer
· SDLC/HDLC
· Frame Relay
· ISDN
· X.25

Section D: Security Techniques
· Tunneling
· Network Monitors
· Transparency
· Hash Totals
· Email Security
· Facsimile Security
· Voice Communication

Section E: Common Network Attacks
· Network Abuses
· ARP
· DoS/DDoS
· Flooding
· Spoofing
· Spamming
· Eavesdropping
· Sniffers

Buy Premium Account & Support me

Dear visitor, you are browsing our website as Guest.
We strongly recommend you to register and login to view hidden contents.

Add Comment

Name:*
E-Mail:
Comment:
Bold Italic Underline Strike | Align left Center Align right | Insert smilies Insert link URLInsert protected URL Select color | Add Hidden Text Insert Quote Convert selected text from selection to Cyrillic (Russian) alphabet Insert spoiler
Security Code: *
Click on the image to refresh the code if it cannot be viewed