CISSP® - Communications and Network Security

This course will help you to earn your CISSP® and deep-dive into the Communications and Network Security domain of the Certified Information Systems Security Professional (CISSP®) certification.
Course info
Rating
(34)
Level
Intermediate
Updated
Apr 22, 2016
Duration
1h 39m
Table of contents
Course Overview
Introduction
Secure Network Architecture and Design
Supervisory Control and Data Acquisition (SCADA)
Network Protocols
Securing Network Components
Communication Channels
Network Attacks
Description
Course info
Rating
(34)
Level
Intermediate
Updated
Apr 22, 2016
Duration
1h 39m
Description

If you want to learn practical communications and network security skills while preparing for your CISSP®, this course will show you how! Deep dive into the Communications and Network Security domain of the Certified Information Systems Security Professional (CISSP®) certification. You'll gain knowledge and skills in the areas of secure network architecture and design as well as supervisory control and data acquisition (SCADA). Next, you'll go over network protocols and securing their components. Finally, you'll learn more about communication channels and network attacks. By the end of this course, you will be more prepared for the CISSP exam and you'll also be more knowledgeable when it comes to communications and network security.

About the author
About the author

Evan is an engineer by nature and a security professional by trade with over a decade of experience in technology and security. He enjoys learning new technologies and how to get more out of existing technologies through integration, enrichment, and innovation of new use cases.

Section Introduction Transcripts
Section Introduction Transcripts

Course Overview
Hi everyone, my name is Evan Morgan, and welcome to my course, CISSP - Communications and Network Security. This course is focused on the communications and network security domain of the Certified Information System Security Professional certification, or as it is commonly referred to, the CISSP. This course will help you prepare for the CISSP exam. Some of the major topics we'll include are Secure Network Architecture and Design, SCADA Systems and Network Protocols, Securing Network Components and Communication Channels, as well as Network Attacks. By the end of this course you'll know what the CISSP focuses on in the communications and network security domain, and before beginning this course you should be familiar with information security and networking concepts. I hope you'll join me on this journey to learn about this domain of the CISSP exam, with the CISSP - Communications and Network Security course here at Pluralsight.

Introduction
Hi, I'm Evan Morgan, and in this course I'm going to be discussing Communications and Network Security. Communications and Network Security is one of the eight domains of the Certified Information Systems Security Professional certification, or as it is commonly referred to, the CISSP. In this course we'll cover the four topics of Communications and Network Security domain, across six modules. Specifically, we'll cover the following, Secure Network Architecture and Design, Supervisory Control and Data Acquisition, or SCADA for short, Network Protocols, Securing Network Components, Communication Channels, and Network Attacks.

Secure Network Architecture and Design
Hi, I'm Evan Morgan, and in this module I'm going to be discussing Secure Network Architecture and Design. Secure Network Architecture and Design is part of the first objective of the Communications and Network Security domain of the Certified Information Systems Security Professional certification, or as it is commonly referred to, the CISSP. Secure Network Architecture and Design is a key concept to understand for any information security program, as well as for the CISSP exam. Numerous other components in an information security program build upon an organization's securely designed network architecture, so without a secure network architecture in place, it is next to impossible to affectively secure the valuable assets connected to your network. In this module, I'll introduce the Open Systems Interconnect model, or OSI for short, and how modern networking aligns to it. Then we'll compare the OSI model with the TCP/IP model, which stands for Transmission Control Protocol/Internet Protocol, followed by discussing network security and IP-based networking. Then we'll go through an outline of high-level network zones and common network services that are available to them. And lastly, as previously mentioned, Secure Network Architecture and Design is the first objective of the Communications and Network Security domain of the CISSP exam.

Supervisory Control and Data Acquisition (SCADA)
Hi, I'm Evan Morgan, and in this module I'm going to be discussing Supervisory Control and Data Acquisition, or SCADA for short. SCADA is part of the first objective of the Communications and Network Security domain of the Certified Information Systems Security Professional certification, or as it is commonly referred to, the CISSP. Depending on the industry that you work in, SCADA can be a very relevant topic with increasing evidence that the concerns security professionals have about the current state of most SCADA systems are being realized. In this module, I'll introduce the concept of Supervisory Control and Data Acquisition. Then we'll outline the common components in a SCADA environment, followed by discussing security concerns specific to SCADA, and lastly, as previously mentioned, the Supervisory Control and Data Acquisition is part of the first objective of the Communications and Network Security domain of the CISSP exam.

Network Protocols
Hi, I'm Evan Morgan, and in this module I'm going to be discussing Network Protocols. Network protocols are a part of the first objective of the Communications and Network Security domain, of the Certified Information Systems Security Professional certification, or as it is commonly referred to, the CISSP. Network protocols are an underlying concept for all modern computing networks. Which ones are used, how are they used, should be carefully thought through by your organization before introducing any and all of them into your networking environment. In this module we'll discuss storage-focused network protocols, then we'll discuss Multi-Protocol Label Switching, or MPLS for short, followed by discussing Voice over Internet Protocol, or VoIP for short. Then we'll go through an outline of wireless connectivity examples and some security concerns with them, as well as discussion around asymmetric cryptography and its implementation through Public Key Infrastructure, or PKI for short. And lastly, as previously mentioned, Network Protocols is part of the first objective of the Communications and Network Security domain of the CISSP exam.

Securing Network Components
Hi, I'm Evan Morgan, and in this module I'm going to be discussing Securing Network Components. Securing Network Components is the second objective of the Communications and Network Security domain of the Certified Information Systems Security Professional certification, or as it is commonly referred to, the CISSP. Securing Network Components is an important part of any information security program, especially because network components are what connect various other systems, so a compromise in your network components could lead to a compromise of all network traffic that those network components process. In this module, we'll discuss high security value network components, then we'll outline common wired transmission mediums, as well as discuss common firewall types, how they work, what their drawbacks are, and how they can provide translation services. Then we'll discuss proxies, how they work, and what value they can provide, and lastly, as previously mentioned, Securing Network Components is the second objective of the Communications and Network Security domain of the CISSP exam.

Communication Channels
Hi, I'm Evan Morgan, and in this module I'm going to be discussing Communication Channels. Communication Channels is the third objective of the Communications and Network Security domain, of the Certified Information Systems Security Professional certification, or as it is commonly referred to, the CISSP. Understanding the various communication channels that are available in your network is an important part of any information security program, since each have aspects about their use that can cause concerns from an information security perspective. In this module, we'll compare circuit and packet switching, then we'll outline layer two network protocols, as well as outline Wide Area Networking methods, or WAN for short. Then we'll discuss electronic communication methods, as well as discuss some common Virtual Private Network, or VPN for short, and remote access methods. Then we'll outline Virtual Local Area Networks, or VLANs for short, and lastly, as previously mentioned, Communication Channels is the third objective of the Communications and Network Security domain of the CISSP exam.

Network Attacks
Hi, I'm Evan Morgan, and in this module I'm going to be discussing Network Attacks. Network Attacks is the fourth objective of the Communications and Network Security domain of the Certified Information Systems Security Professional certification, or as it is commonly referred to, the CISSP. Network attacks are pretty common in modern enterprises. So understanding them, as well as how to defend against them is an important part of any information security program. In this module we'll outline themes seen for network-based attacks. Then we'll discuss tools and techniques that can be leveraged to defend your network. And lastly, as previously mentioned, Network Attacks is the fourth objective of the Communications and Network Security domain of the CISSP exam.