Об этом курсе

Недавно просмотрено: 28,447
Сертификат, ссылками на который можно делиться с другими людьми
Получите сертификат по завершении
100% онлайн
Начните сейчас и учитесь по собственному графику.
Курс 5 из 6 в программе
Гибкие сроки
Назначьте сроки сдачи в соответствии со своим графиком.
Начальный уровень
Прибл. 20 часов на выполнение
Английский

Преподаватели

Сертификат, ссылками на который можно делиться с другими людьми
Получите сертификат по завершении
100% онлайн
Начните сейчас и учитесь по собственному графику.
Курс 5 из 6 в программе
Гибкие сроки
Назначьте сроки сдачи в соответствии со своим графиком.
Начальный уровень
Прибл. 20 часов на выполнение
Английский

от партнера

Placeholder

(ISC)²

Программа курса: что вы изучите

Неделя
1

Неделя 1

7 ч. на завершение

Understand Security Issues Related to Networks

7 ч. на завершение
26 видео ((всего 168 мин.)), 23 материалов для самостоятельного изучения, 1 тест
26 видео
Understand Security Issues: OSI Model (Layers 4, 5, 6, and 7)4мин
Understand Security Issues: OSI Model (Layers 1,2, and 3)4мин
Understand Security Issues: OSI Model7мин
Understand Security Issues: Layers Review4мин
Understand Security Issues: Layers Review7мин
Understand Security Issues: IP Networking5мин
Understand Security Issues: Network Classes11мин
Understand Security Issues: IPv65мин
Understand Security Issues: DHCP3мин
Understand Security Issues: DHCP6мин
Understand Security Issues: ICMP6мин
Understand Security Issues: Ping Scanning6мин
Understand Security Issues: RPC5мин
Understand Security Issues: Ring7мин
Understand Security Issues: Unicast, Multicast, and Broadcast Transmissions6мин
Understand Security Issues: Packet-Switched Networks4мин
Understand Security Issues: CSMA8мин
Understand Security Issues: FDDI5мин
Understand Security Issues: DNS5мин
Understand Security Issues: DNS12мин
Understand Security Issues: DNS Quick Reference6мин
Understand Security Issues: FTP4мин
Understand Security Issues: Proxies7мин
Understand Security Issues: HTTP Tunneling5мин
Understand Security Issues: SCADA Attacks6мин
23 материала для самостоятельного изучения
Networks and Communications Security10мин
Understand Security Issues: OSI Model (Layers 4, 5, 6, and 7)10мин
Understand Security Issues: OSI Model (Layers 1,2, and 3)10мин
Understand Security Issues: Layers Review10мин
Understand Security Issues: Layers Review10мин
Understand Security Issues: IP Networking10мин
Understand Security Issues: Network Classes10мин
Understand Security Issues: IPv610мин
Understand Security Issues: DHCP10мин
Understand Security Issues: DHCP10мин
Understand Security Issues: ICMP10мин
Understand Security Issues: Ping Scanning10мин
Understand Security Issues: RPC10мин
Understand Security Issues: Ring10мин
Understand Security Issues: Unicast, Multicast, and Broadcast Transmissions10мин
Understand Security Issues: Packet-Switched Networks10мин
Understand Security Issues: CSMA10мин
Understand Security Issues: FDDI10мин
Understand Security Issues: DNS Quick Reference10мин
Understand Security Issues: FTP10мин
Understand Security Issues: Proxies10мин
Understand Security Issues: HTTP Tunneling10мин
Understand Security Issues: SCADA Attacks10мин
1 практическое упражнение
Quiz 130мин
Неделя
2

Неделя 2

4 ч. на завершение

Protect Telecommunications Technologies and Control Network Access

4 ч. на завершение
13 видео ((всего 88 мин.)), 13 материалов для самостоятельного изучения, 1 тест
13 видео
Protect Telecommunications Technologies: MPLS7мин
Protect Telecommunications Technologies: MPLS L3 VPNs6мин
Protect Telecommunications Technologies: SIP14мин
Control Network Access: Access Control and Monitoring7мин
Control Network Access: Blind Spoofing5мин
Control Network Access: Bastion Host5мин
Control Network Access: Wired Transmissions6мин
Control Network Access: Patch Panels5мин
Control Network Access: Remote Meeting Technology6мин
Control Network Access: PPTP5мин
Control Network Access: SNMP4мин
Control Network Access: Virtual Network Terminal Services6мин
13 материалов для самостоятельного изучения
Protect Telecommunications Technologies: IP Convergence10мин
Protect Telecommunications Technologies: MPLS10мин
Protect Telecommunications Technologies: MPLS L3 VPNs10мин
Protect Telecommunications Technologies: SIP10мин
Control Network Access: Access Control and Monitoring10мин
Control Network Access: Blind Spoofing10мин
Control Network Access: Bastion Host10мин
Control Network Access: Wired Transmissions10мин
Control Network Access: Patch Panels10мин
Control Network Access: Remote Meeting Technology10мин
Control Network Access: PPTP10мин
Control Network Access: SNMP10мин
Control Network Access: Virtual Network Terminal Services10мин
1 практическое упражнение
Quiz 230мин
Неделя
3

Неделя 3

3 ч. на завершение

Operate and Configure Network-Based Security Devices

3 ч. на завершение
11 видео ((всего 62 мин.)), 11 материалов для самостоятельного изучения, 1 тест
11 видео
Network-Based Security Devices: Availability3мин
Network-Based Security Devices: Open Mail Relay Servers5мин
Network-Based Security Devices: NAT7мин
Network-Based Security Devices: Proxies5мин
Network-Based Security Devices: FIN, NULL, and XMAS Scanning5мин
Network-Based Security Devices: IDS6мин
Network-Based Security Devices: IP Fragmentation Attacks and Crafted Packets4мин
Network-Based Security Devices: Smurf and Fraggle Attacks6мин
Network-Based Security Devices: DoS5мин
Network-Based Security Devices: Manipulation of DNS Queries5мин
11 материалов для самостоятельного изучения
Network-Based Security Devices: Network as a Bastion of Defense10мин
Network-Based Security Devices: Availability10мин
Network-Based Security Devices: Open Mail Relay Servers10мин
Network-Based Security Devices: NAT10мин
Network-Based Security Devices: Proxies10мин
Network-Based Security Devices: FIN, NULL, and XMAS Scanning10мин
Network-Based Security Devices: IDS10мин
Network-Based Security Devices: IP Fragmentation Attacks and Crafted Packets10мин
Network-Based Security Devices: Smurf and Fraggle Attacks10мин
Network-Based Security Devices: DoS10мин
Network-Based Security Devices: Manipulation of DNS Queries10мин
1 практическое упражнение
Quiz 330мин
Неделя
4

Неделя 4

3 ч. на завершение

Manage LAN-Based Security and Implement and Operate Wireless Technologies

3 ч. на завершение
10 видео ((всего 68 мин.)), 10 материалов для самостоятельного изучения, 1 тест
10 видео
LAN-Based Security: Segmentation6мин
LAN-Based Security: How Does Tagging Work?5мин
LAN-Based Security: Common Attacks Against the Data-Link Layer6мин
LAN-Based Security: Secure Device Management6мин
LAN-Based Security: DNSSEC8мин
Implement and Operate Wireless Technologies: Types of Wireless Technologies6мин
Implement and Operate Wireless Technologies: TDMA6мин
Implement and Operate Wireless Technologies: Infrastructure Mode7мин
Implement and Operate Wireless Technologies: Share Key Authentication Flaw6мин
10 материалов для самостоятельного изучения
LAN-Based Security: Separation of Data Plane and Control Plane10мин
LAN-Based Security: Segmentation10мин
LAN-Based Security: How Does Tagging Work?10мин
LAN-Based Security: Common Attacks Against the Data-Link Layer10мин
LAN-Based Security: Secure Device Management10мин
LAN-Based Security: DNSSEC10мин
Implement and Operate Wireless Technologies: Types of Wireless Technologies10мин
Implement and Operate Wireless Technologies: TDMA10мин
Implement and Operate Wireless Technologies: Infrastructure Mode10мин
Implement and Operate Wireless Technologies: Share Key Authentication Flaw10мин
1 практическое упражнение
Quiz 430мин

Рецензии

Лучшие отзывы о курсе NETWORKS AND COMMUNICATIONS SECURITY

Посмотреть все отзывы

(ISC)² Systems Security Certified Practitioner (SSCP) : общие сведения

(ISC)² Systems Security Certified Practitioner (SSCP)

Часто задаваемые вопросы

Остались вопросы? Посетите Центр поддержки учащихся.