À propos de ce cours

9,726 consultations récentes
Certificat partageable
Obtenez un Certificat lorsque vous terminez
100 % en ligne
Commencez dès maintenant et apprenez aux horaires qui vous conviennent.
Dates limites flexibles
Réinitialisez les dates limites selon votre disponibilité.
Niveau débutant
Approx. 20 heures pour terminer
Anglais

Enseignant

Certificat partageable
Obtenez un Certificat lorsque vous terminez
100 % en ligne
Commencez dès maintenant et apprenez aux horaires qui vous conviennent.
Dates limites flexibles
Réinitialisez les dates limites selon votre disponibilité.
Niveau débutant
Approx. 20 heures pour terminer
Anglais

Offert par

Placeholder

(ISC)²

Programme du cours : ce que vous apprendrez dans ce cours

Semaine
1

Semaine 1

7 heures pour terminer

Understand Security Issues Related to Networks

7 heures pour terminer
26 vidéos (Total 168 min), 23 lectures, 1 quiz
26 vidéos
Understand Security Issues: OSI Model (Layers 4, 5, 6, and 7)4 min
Understand Security Issues: OSI Model (Layers 1,2, and 3)4 min
Understand Security Issues: OSI Model7 min
Understand Security Issues: Layers Review4 min
Understand Security Issues: Layers Review7 min
Understand Security Issues: IP Networking5 min
Understand Security Issues: Network Classes11 min
Understand Security Issues: IPv65 min
Understand Security Issues: DHCP3 min
Understand Security Issues: DHCP6 min
Understand Security Issues: ICMP6 min
Understand Security Issues: Ping Scanning6 min
Understand Security Issues: RPC5 min
Understand Security Issues: Ring7 min
Understand Security Issues: Unicast, Multicast, and Broadcast Transmissions6 min
Understand Security Issues: Packet-Switched Networks4 min
Understand Security Issues: CSMA8 min
Understand Security Issues: FDDI5 min
Understand Security Issues: DNS5 min
Understand Security Issues: DNS12 min
Understand Security Issues: DNS Quick Reference6 min
Understand Security Issues: FTP4 min
Understand Security Issues: Proxies7 min
Understand Security Issues: HTTP Tunneling5 min
Understand Security Issues: SCADA Attacks6 min
23 lectures
Networks and Communications Security10 min
Understand Security Issues: OSI Model (Layers 4, 5, 6, and 7)10 min
Understand Security Issues: OSI Model (Layers 1,2, and 3)10 min
Understand Security Issues: Layers Review10 min
Understand Security Issues: Layers Review10 min
Understand Security Issues: IP Networking10 min
Understand Security Issues: Network Classes10 min
Understand Security Issues: IPv610 min
Understand Security Issues: DHCP10 min
Understand Security Issues: DHCP10 min
Understand Security Issues: ICMP10 min
Understand Security Issues: Ping Scanning10 min
Understand Security Issues: RPC10 min
Understand Security Issues: Ring10 min
Understand Security Issues: Unicast, Multicast, and Broadcast Transmissions10 min
Understand Security Issues: Packet-Switched Networks10 min
Understand Security Issues: CSMA10 min
Understand Security Issues: FDDI10 min
Understand Security Issues: DNS Quick Reference10 min
Understand Security Issues: FTP10 min
Understand Security Issues: Proxies10 min
Understand Security Issues: HTTP Tunneling10 min
Understand Security Issues: SCADA Attacks10 min
1 exercice pour s'entraîner
Quiz 130 min
Semaine
2

Semaine 2

4 heures pour terminer

Protect Telecommunications Technologies and Control Network Access

4 heures pour terminer
13 vidéos (Total 88 min), 13 lectures, 1 quiz
13 vidéos
Protect Telecommunications Technologies: MPLS7 min
Protect Telecommunications Technologies: MPLS L3 VPNs6 min
Protect Telecommunications Technologies: SIP14 min
Control Network Access: Access Control and Monitoring7 min
Control Network Access: Blind Spoofing5 min
Control Network Access: Bastion Host5 min
Control Network Access: Wired Transmissions6 min
Control Network Access: Patch Panels5 min
Control Network Access: Remote Meeting Technology6 min
Control Network Access: PPTP5 min
Control Network Access: SNMP4 min
Control Network Access: Virtual Network Terminal Services6 min
13 lectures
Protect Telecommunications Technologies: IP Convergence10 min
Protect Telecommunications Technologies: MPLS10 min
Protect Telecommunications Technologies: MPLS L3 VPNs10 min
Protect Telecommunications Technologies: SIP10 min
Control Network Access: Access Control and Monitoring10 min
Control Network Access: Blind Spoofing10 min
Control Network Access: Bastion Host10 min
Control Network Access: Wired Transmissions10 min
Control Network Access: Patch Panels10 min
Control Network Access: Remote Meeting Technology10 min
Control Network Access: PPTP10 min
Control Network Access: SNMP10 min
Control Network Access: Virtual Network Terminal Services10 min
1 exercice pour s'entraîner
Quiz 230 min
Semaine
3

Semaine 3

3 heures pour terminer

Operate and Configure Network-Based Security Devices

3 heures pour terminer
11 vidéos (Total 62 min), 11 lectures, 1 quiz
11 vidéos
Network-Based Security Devices: Availability3 min
Network-Based Security Devices: Open Mail Relay Servers5 min
Network-Based Security Devices: NAT7 min
Network-Based Security Devices: Proxies5 min
Network-Based Security Devices: FIN, NULL, and XMAS Scanning5 min
Network-Based Security Devices: IDS6 min
Network-Based Security Devices: IP Fragmentation Attacks and Crafted Packets4 min
Network-Based Security Devices: Smurf and Fraggle Attacks6 min
Network-Based Security Devices: DoS5 min
Network-Based Security Devices: Manipulation of DNS Queries5 min
11 lectures
Network-Based Security Devices: Network as a Bastion of Defense10 min
Network-Based Security Devices: Availability10 min
Network-Based Security Devices: Open Mail Relay Servers10 min
Network-Based Security Devices: NAT10 min
Network-Based Security Devices: Proxies10 min
Network-Based Security Devices: FIN, NULL, and XMAS Scanning10 min
Network-Based Security Devices: IDS10 min
Network-Based Security Devices: IP Fragmentation Attacks and Crafted Packets10 min
Network-Based Security Devices: Smurf and Fraggle Attacks10 min
Network-Based Security Devices: DoS10 min
Network-Based Security Devices: Manipulation of DNS Queries10 min
1 exercice pour s'entraîner
Quiz 330 min
Semaine
4

Semaine 4

3 heures pour terminer

Manage LAN-Based Security and Implement and Operate Wireless Technologies

3 heures pour terminer
10 vidéos (Total 68 min), 10 lectures, 1 quiz
10 vidéos
LAN-Based Security: Segmentation6 min
LAN-Based Security: How Does Tagging Work?5 min
LAN-Based Security: Common Attacks Against the Data-Link Layer6 min
LAN-Based Security: Secure Device Management6 min
LAN-Based Security: DNSSEC8 min
Implement and Operate Wireless Technologies: Types of Wireless Technologies6 min
Implement and Operate Wireless Technologies: TDMA6 min
Implement and Operate Wireless Technologies: Infrastructure Mode7 min
Implement and Operate Wireless Technologies: Share Key Authentication Flaw6 min
10 lectures
LAN-Based Security: Separation of Data Plane and Control Plane10 min
LAN-Based Security: Segmentation10 min
LAN-Based Security: How Does Tagging Work?10 min
LAN-Based Security: Common Attacks Against the Data-Link Layer10 min
LAN-Based Security: Secure Device Management10 min
LAN-Based Security: DNSSEC10 min
Implement and Operate Wireless Technologies: Types of Wireless Technologies10 min
Implement and Operate Wireless Technologies: TDMA10 min
Implement and Operate Wireless Technologies: Infrastructure Mode10 min
Implement and Operate Wireless Technologies: Share Key Authentication Flaw10 min
1 exercice pour s'entraîner
Quiz 430 min

Avis

Meilleurs avis pour NETWORKS AND COMMUNICATIONS SECURITY

Voir tous les avis

À propos du (ISC)² Systems Security Certified Practitioner (SSCP)

(ISC)² Systems Security Certified Practitioner (SSCP)

Foire Aux Questions

D'autres questions ? Visitez le Centre d'Aide pour les Etudiants.