—Course Overview
1m 2s
—CISSP® - Communications and Network Security
0m 41s
—What Is Communications and Network Security and What's Next?
1m 12s
Secure Network Architecture and Design
- 21m 24s
—Introduction to Secure Network Architecture and Design
1m 21s
—Network Security Defined
1m 15s
—The Open System Interconnect (OSI) Model
0m 27s
—Physical Layer
0m 25s
—Data Link Layer
0m 35s
—Network Layer
0m 51s
—Transport Layer
0m 46s
—Session Layer
0m 29s
—Presentation Layer
0m 25s
—Application Layer
0m 52s
—OSI Model vs. TCP/IP Model
0m 59s
—Internet Protocol (IP) Networking
1m 56s
—IP Classes and CIDR
2m 12s
—Ports
1m 14s
—Network Topologies
1m 51s
—High-level Network Zone Concepts
2m 40s
—Common Network Services
2m 17s
—Summary and What’s Next
0m 42s
Supervisory Control and Data Acquisition (SCADA)
- 5m 17s
—Introduction to Supervisory Control and Data Acquisition
0m 55s
—Supervisory Control and Data Acquisition Defined
0m 49s
—Components of SCADA
1m 10s
—SCADA Security Concerns
1m 49s
—Summary and What’s Next
0m 32s
Network Protocols
- 16m 42s
—Introduction to Network Protocols
1m 8s
—Network Protocols Defined
0m 30s
—Storage-focused Network Protocols
1m 24s
—Multi-protocol Label Switching (MPLS)
1m 2s
—Voice Over Internet Protocol (VoIP)
0m 59s
—Wireless Connectivity
3m 27s
—Cryptography Defined
0m 40s
—Forms of Cryptography
2m 20s
—Benefits of Asymmetric Cryptography
0m 45s
—Public Key Infrastructure (PKI)
0m 51s
—Digital Signatures
1m 17s
—Certificate Hierarchies and Chains
1m 31s
—Summary and What’s Next
0m 41s
Securing Network Components
- 12m 50s
—Introduction to Securing Network Components
1m 1s
—Securing Network Components Defined
0m 46s
—High Security Value Network Components
0m 17s
—Routers
0m 56s
—Switches
0m 44s
—Virtual Private Network (VPN) Concentrators
1m 0s
—Modems
0m 42s
—Common Transmission Mediums
1m 6s
—Common Firewall Types
0m 14s
—Packet Filtering Firewalls
0m 46s
—Stateful Inspection Firewalls
1m 6s
—Application Firewalls
0m 40s
—'Next Generation' Firewalls
0m 54s
—Address Translation
1m 0s
—Proxies
0m 55s
—Summary and What’s Next
0m 38s
Communication Channels
- 26m 59s
—Introduction to Communication Channels
1m 5s
—Circuit vs. Packet Networks
0m 50s
—Carrier Sense Multiple Access
1m 0s
—Token Passing
0m 24s
—Common Layer Two Networking Protocols
0m 15s
—Ethernet
0m 35s
—Token Ring
0m 27s
—Fiber Distributed Data Interface
0m 43s
—Wide Area Networking
0m 28s
—Integrated Services Digital Network
1m 4s
—Asynchronous Transfer Mode
0m 56s
—Digital Subscriber Line
0m 48s
—Cable Modem
0m 42s
—X.25
0m 47s
—Frame Relay
0m 39s
—T, E, and OC
0m 40s
—Common Electronic Communication Methods
0m 17s
—Analog vs. Digital
1m 7s
—Voice Communication Channel
1m 39s
—Email
0m 58s
—Instant Messaging and Chat Rooms
0m 56s
—Peer to Peer Sharing
0m 45s
—Virtual Meetings
0m 36s
—Common Virtual Private Network Methods
0m 23s
—Point to Point Tunneling Protocol
0m 25s
—Layer Two Tunneling Protocol
0m 24s
—Internet Protocol Security
0m 36s
—Transport Mode vs. Tunnel Mode
1m 6s
—Secure Sockets Layering
0m 51s
—Common Remote Access Methods
0m 16s
—Telnet
0m 44s
—rlogin
0m 31s
—Secure Shell
0m 36s
—Terminal Services
0m 33s
—Virtual Local Area Networks
0m 33s
—Private VLANs
0m 33s
—Secondary VLAN Subtypes
0m 46s
—Summary and What’s Next
0m 43s
—Introduction to Network Attacks
0m 44s
—Themes of Network Attacks
0m 18s
—Reconnaissance
0m 57s
—Spamming
0m 29s
—Spoofing
1m 44s
—Packet Manipulation
1m 8s
—Session Hijacking
0m 45s
—Denial of Service
1m 47s
—Tools and Techniques for Network Defense
0m 24s
—Intrusion Detection / Prevention Systems
1m 39s
—Security Information and Event Management
1m 8s
—Vulnerability Management and Penetration Testing
1m 6s
—Summary and What’s Next
0m 48s