Об этом курсе
Недавно просмотрено: 7,125

100% онлайн

Начните сейчас и учитесь по собственному графику.

Гибкие сроки

Назначьте сроки сдачи в соответствии со своим графиком.

Начальный уровень

Прибл. 13 часа на выполнение

Предполагаемая нагрузка: 5 hours/week...

Английский

Субтитры: Английский
User
Учащиеся, которые проходят продукт ''Course'
  • Customer Care Reps
  • Technical Support Associates
  • Engineers
  • Software Engineers
User
Учащиеся, которые проходят продукт ''Course'
  • Customer Care Reps
  • Technical Support Associates
  • Engineers
  • Software Engineers

100% онлайн

Начните сейчас и учитесь по собственному графику.

Гибкие сроки

Назначьте сроки сдачи в соответствии со своим графиком.

Начальный уровень

Прибл. 13 часа на выполнение

Предполагаемая нагрузка: 5 hours/week...

Английский

Субтитры: Английский

Программа курса: что вы изучите

Неделя
1
7 ч. на завершение

Understand Security Issues Related to Networks

26 видео ((всего 168 мин.)), 23 материалов для самостоятельного изучения, 1 тест
26 видео
Understand Security Issues: OSI Model (Layers 4, 5, 6, and 7)4мин
Understand Security Issues: OSI Model (Layers 1,2, and 3)4мин
Understand Security Issues: OSI Model7мин
Understand Security Issues: Layers Review4мин
Understand Security Issues: Layers Review7мин
Understand Security Issues: IP Networking5мин
Understand Security Issues: Network Classes11мин
Understand Security Issues: IPv65мин
Understand Security Issues: DHCP3мин
Understand Security Issues: DHCP6мин
Understand Security Issues: ICMP6мин
Understand Security Issues: Ping Scanning6мин
Understand Security Issues: RPC5мин
Understand Security Issues: Ring7мин
Understand Security Issues: Unicast, Multicast, and Broadcast Transmissions6мин
Understand Security Issues: Packet-Switched Networks4мин
Understand Security Issues: CSMA8мин
Understand Security Issues: FDDI5мин
Understand Security Issues: DNS5мин
Understand Security Issues: DNS12мин
Understand Security Issues: DNS Quick Reference6мин
Understand Security Issues: FTP4мин
Understand Security Issues: Proxies7мин
Understand Security Issues: HTTP Tunneling5мин
Understand Security Issues: SCADA Attacks6мин
23 материала для самостоятельного изучения
Networks and Communications Security10мин
Understand Security Issues: OSI Model (Layers 4, 5, 6, and 7)10мин
Understand Security Issues: OSI Model (Layers 1,2, and 3)10мин
Understand Security Issues: Layers Review10мин
Understand Security Issues: Layers Review10мин
Understand Security Issues: IP Networking10мин
Understand Security Issues: Network Classes10мин
Understand Security Issues: IPv610мин
Understand Security Issues: DHCP10мин
Understand Security Issues: DHCP10мин
Understand Security Issues: ICMP10мин
Understand Security Issues: Ping Scanning10мин
Understand Security Issues: RPC10мин
Understand Security Issues: Ring10мин
Understand Security Issues: Unicast, Multicast, and Broadcast Transmissions10мин
Understand Security Issues: Packet-Switched Networks10мин
Understand Security Issues: CSMA10мин
Understand Security Issues: FDDI10мин
Understand Security Issues: DNS Quick Reference10мин
Understand Security Issues: FTP10мин
Understand Security Issues: Proxies10мин
Understand Security Issues: HTTP Tunneling10мин
Understand Security Issues: SCADA Attacks10мин
1 практическое упражнение
Quiz 120мин
Неделя
2
4 ч. на завершение

Protect Telecommunications Technologies and Control Network Access

13 видео ((всего 88 мин.)), 13 материалов для самостоятельного изучения, 1 тест
13 видео
Protect Telecommunications Technologies: MPLS7мин
Protect Telecommunications Technologies: MPLS L3 VPNs6мин
Protect Telecommunications Technologies: SIP14мин
Control Network Access: Access Control and Monitoring7мин
Control Network Access: Blind Spoofing5мин
Control Network Access: Bastion Host5мин
Control Network Access: Wired Transmissions6мин
Control Network Access: Patch Panels5мин
Control Network Access: Remote Meeting Technology6мин
Control Network Access: PPTP5мин
Control Network Access: SNMP4мин
Control Network Access: Virtual Network Terminal Services6мин
13 материала для самостоятельного изучения
Protect Telecommunications Technologies: IP Convergence10мин
Protect Telecommunications Technologies: MPLS10мин
Protect Telecommunications Technologies: MPLS L3 VPNs10мин
Protect Telecommunications Technologies: SIP10мин
Control Network Access: Access Control and Monitoring10мин
Control Network Access: Blind Spoofing10мин
Control Network Access: Bastion Host10мин
Control Network Access: Wired Transmissions10мин
Control Network Access: Patch Panels10мин
Control Network Access: Remote Meeting Technology10мин
Control Network Access: PPTP10мин
Control Network Access: SNMP10мин
Control Network Access: Virtual Network Terminal Services10мин
1 практическое упражнение
Quiz 220мин
Неделя
3
3 ч. на завершение

Operate and Configure Network-Based Security Devices

11 видео ((всего 62 мин.)), 11 материалов для самостоятельного изучения, 1 тест
11 видео
Network-Based Security Devices: Availability3мин
Network-Based Security Devices: Open Mail Relay Servers5мин
Network-Based Security Devices: NAT7мин
Network-Based Security Devices: Proxies5мин
Network-Based Security Devices: FIN, NULL, and XMAS Scanning5мин
Network-Based Security Devices: IDS6мин
Network-Based Security Devices: IP Fragmentation Attacks and Crafted Packets4мин
Network-Based Security Devices: Smurf and Fraggle Attacks6мин
Network-Based Security Devices: DoS5мин
Network-Based Security Devices: Manipulation of DNS Queries5мин
11 материала для самостоятельного изучения
Network-Based Security Devices: Network as a Bastion of Defense10мин
Network-Based Security Devices: Availability10мин
Network-Based Security Devices: Open Mail Relay Servers10мин
Network-Based Security Devices: NAT10мин
Network-Based Security Devices: Proxies10мин
Network-Based Security Devices: FIN, NULL, and XMAS Scanning10мин
Network-Based Security Devices: IDS10мин
Network-Based Security Devices: IP Fragmentation Attacks and Crafted Packets10мин
Network-Based Security Devices: Smurf and Fraggle Attacks10мин
Network-Based Security Devices: DoS10мин
Network-Based Security Devices: Manipulation of DNS Queries10мин
1 практическое упражнение
Quiz 312мин
Неделя
4
3 ч. на завершение

Manage LAN-Based Security and Implement and Operate Wireless Technologies

10 видео ((всего 68 мин.)), 10 материалов для самостоятельного изучения, 1 тест
10 видео
LAN-Based Security: Segmentation6мин
LAN-Based Security: How Does Tagging Work?5мин
LAN-Based Security: Common Attacks Against the Data-Link Layer6мин
LAN-Based Security: Secure Device Management6мин
LAN-Based Security: DNSSEC8мин
Implement and Operate Wireless Technologies: Types of Wireless Technologies6мин
Implement and Operate Wireless Technologies: TDMA6мин
Implement and Operate Wireless Technologies: Infrastructure Mode7мин
Implement and Operate Wireless Technologies: Share Key Authentication Flaw6мин
10 материала для самостоятельного изучения
LAN-Based Security: Separation of Data Plane and Control Plane10мин
LAN-Based Security: Segmentation10мин
LAN-Based Security: How Does Tagging Work?10мин
LAN-Based Security: Common Attacks Against the Data-Link Layer10мин
LAN-Based Security: Secure Device Management10мин
LAN-Based Security: DNSSEC10мин
Implement and Operate Wireless Technologies: Types of Wireless Technologies10мин
Implement and Operate Wireless Technologies: TDMA10мин
Implement and Operate Wireless Technologies: Infrastructure Mode10мин
Implement and Operate Wireless Technologies: Share Key Authentication Flaw10мин
1 практическое упражнение
Quiz 416мин
4.7
Рецензии: 11Chevron Right

Лучшие отзывы о курсе Networks and Communications Security

автор: GBJul 3rd 2018

Great course. The instructor was clearly a subject matter expert who broke it down so it was easy to understand. Thank you.

автор: RDMar 22nd 2019

It was really a good and beneficial course. I literally have learned many new things.

Преподаватели

Avatar

(ISC)² Education & Training

Education & Training

О (ISC)²

(ISC)² is an international nonprofit membership association focused on inspiring a safe and secure cyber world. Best known for the acclaimed Certified Information Systems Security Professional (CISSP®) certification, (ISC)2 offers a portfolio of credentials that are part of a holistic, programmatic approach to security. www.isc2.org ...

Специализация (ISC)² Systems Security Certified Practitioner (SSCP) : общие сведения

Pursue better IT security job opportunities and prove knowledge with confidence. The SSCP Professional Training Certificate shows employers you have the IT security foundation to defend against cyber attacks – and puts you on a clear path to earning SSCP certification. Learn on your own schedule with 120-day access to content aligned with the latest (ISC)2 SSCP exam domains. We’re offering the complete online self-paced program for only $1,000 – a $200 savings when you get all domains bundled together. 3 Steps to Career Advancement 1. Register for the course 2. Gain access for 120 days 3. Register and sit for the SSCP certification exam Upon completing the SSCP Professional Certificate, you will: 1. Complete six courses of preparing you to sit for the Systems Security Certified Practitioner (SSCP) certification exam as outlined below. Course 1 - Access Controls Course 2 - Security Operations and Administration Course 3 - Risk Identification, Monitoring, and Analysis/Incident Response and Recovery Course 4 - Cryptography Course 5 - Network and Communication Security Course 6 - Systems and Application Security 2. Receive a certificate of program completion. 3. Understand how to implement, monitor and administer an organization’s IT infrastructure in accordance with security policies and procedures that ensure data confidentiality, integrity and availability....
(ISC)² Systems Security Certified Practitioner (SSCP)

Часто задаваемые вопросы

  • Да, до регистрации можно просмотреть первое видео и программу курса. Чтобы получить полный доступ к материалам курса, необходимо оплатить его.

  • Регистрируясь на курс до начала сессии, вы получаете доступ ко всем видеолекциям и материалам для самостоятельного изучения. Задания можно отправлять после начала сессии.

  • После регистрации на курс и начала сессии вы получаете доступ ко всем видео и другим ресурсам курса, включая материалы для самостоятельного изучения и форумы обсуждений. Вы сможете выполнять тренировочные, а также сдавать обязательные оцениваемые задания и получить сертификат о прохождении курса.

  • Если вы успешного пройдете курс, на странице ваших достижений появится электронный сертификат, который можно распечатать или прикрепить к профилю LinkedIn.

  • Это один из немногих курсов на Coursera, которые предоставляются только на платной основе.

  • The course schedule contains approximately 15 hours of content material covering lectures, reading materials, a case study, and quizzes broken up over the course of 7 weeks.

Остались вопросы? Посетите Центр поддержки учащихся.