Discover millions of ebooks, audiobooks, and so much more with a free trial

Only $11.99/month after trial. Cancel anytime.

Communication and Network Security: CISSP, #4
Communication and Network Security: CISSP, #4
Communication and Network Security: CISSP, #4
Ebook129 pages43 minutes

Communication and Network Security: CISSP, #4

Rating: 0 out of 5 stars

()

Read preview

About this ebook

Communication and Network security is the 4th domain of the CISSP certification. In this course we will cover secure network architecture and design, Supervisory Control and Data Acquisition (SCADA), network protocols, securing network components, communication channels and network attacks.

LanguageEnglish
Release dateApr 2, 2020
ISBN9781393010753
Communication and Network Security: CISSP, #4
Author

Selwyn Classen

A seasoned and highly qualified IT/IS professional with over 20 years working experience within the Petrochemical industry (i.e. Supply chain management, Knowledge management, Product and Quality management, Business analysis and processing) including the Telecommunications industry.

Read more from Selwyn Classen

Related to Communication and Network Security

Titles in the series (8)

View More

Related ebooks

Teaching Methods & Materials For You

View More

Related articles

Reviews for Communication and Network Security

Rating: 0 out of 5 stars
0 ratings

0 ratings0 reviews

What did you think?

Tap to rate

Review must be at least 10 words

    Book preview

    Communication and Network Security - Selwyn Classen

    While every precaution has been taken in the preparation of this book, the publisher assumes no responsibility for errors or omissions, or for damages resulting from the use of the information contained herein.

    COMMUNICATION AND NETWORK SECURITY

    First edition. April 2, 2020.

    Copyright © 2020 Selwyn Classen.

    Written by Selwyn Classen.

    Table of Contents

    Introduction

    Communications and Network Security

    What Are Communications and Network Security and What's Next?

    Secure Network Architecture and Design

    Introduction to Secure Network Architecture and Design

    Network Security Defined

    The Open System Interconnect (OSI) Model

    Physical Layer

    Data Link Layer

    Network Layer

    Transport Layer

    Session Layer

    Presentation Layer

    Application Layer

    OSI Model vs. TCP/IP Model

    Internet Protocol (IP) Networking

    IP Classes and CIDR

    Ports

    Network Topologies

    High-level Network Zone Concepts

    Common Network Services

    Summary and What’s Next

    Supervisory Control and Data Acquisition (SCADA)

    Introduction to Supervisory Control and Data Acquisition

    Supervisory Control and Data Acquisition Defined

    Components of SCADA

    SCADA Security Concerns

    Summary and What’s Next

    Network Protocols

    Introduction to Network Protocols

    Network Protocols Defined

    Storage-focused Network Protocols

    Multi-protocol Label Switching (MPLS)

    Voice Over Internet Protocol (VoIP)

    Wireless Connectivity

    Cryptography Defined

    Forms of Cryptography

    Benefits of Asymmetric Cryptography

    Public Key Infrastructure (PKI)

    Digital Signatures

    Certificate Hierarchies and Chains

    Summary and What’s Next

    Securing Network Components

    Introduction to Securing Network Components

    Securing Network Components Defined

    High-Security Value Network Components

    Routers

    Switches

    Virtual Private Network (VPN) Concentrators

    Modems

    Common Transmission Mediums

    Common Firewall Types

    Packet Filtering Firewalls

    Stateful Inspection Firewalls

    Application Firewalls

    'Next Generation' Firewalls

    Address Translation

    Proxies

    Summary and What’s Next

    Communication Channels

    Introduction to Communication Channels

    Circuit vs. Packet Networks

    Carrier Sense Multiple Access

    Token Passing

    Common Layer Two Networking Protocols

    Ethernet

    Token Ring

    Fibre Distributed Data Interface

    Wide Area Networking

    Integrated Services Digital Network

    Asynchronous Transfer Mode

    Digital Subscriber Line

    Cable Modem

    X.25

    Frame Relay

    T, E, and OC

    Common Electronic Communication Methods

    Analog vs. Digital

    Voice Communication Channel

    Email

    Instant Messaging and Chat Rooms

    Peer to Peer Sharing

    Virtual Meetings

    Common Virtual Private Network Methods

    Point to Point Tunneling Protocol

    Layer Two Tunneling Protocol

    Internet Protocol Security

    Transport Mode vs. Tunnel Mode

    Secure Sockets Layering

    Common Remote Access Methods

    Telnet

    rlogin

    Secure Shell

    Terminal Services

    Virtual Local Area Networks

    Private VLANs

    Secondary VLAN Subtypes

    Summary and What’s Next

    Network Attacks

    Introduction to Network Attacks

    Themes of Network Attacks

    Reconnaissance

    Spamming

    Spoofing

    Packet Manipulation

    Session Hijacking

    Denial of Service

    Tools and Techniques for Network Defense

    Intrusion Detection / Prevention Systems

    Security Information and Event Management

    Vulnerability Management and Penetration Testing

    Summary and What’s Next

    Introduction

    Communications and Network Security

    In this course, we'll be going to be discussing Communications and Network Security. To start, communications and network security is one of the 8 domains of the Certified Information Systems Security Professional certification (CISSP). In this course, we'll cover the four topics of Communications and Network Security domain, across six modules. Specifically, we'll cover the following, Secure Network Architecture and Design, Supervisory Control and Data Acquisition (SCADA), Network Protocols, Securing Network Components, Communication Channels, and Network Attacks. 

    What Are Communications and Network Security and What's Next?

    To start, this quote can help with an underlying point on information security. Kevin Mitnick, who is a relatively famous computer security expert, who was imprisoned for some of his activities, has previously stated that Companies spend millions of dollars on firewalls, encryption and secure access devices, and its money wasted because none of these measures addresses the weakest link in the security chain. I don't completely agree with this statement as these devices can greatly increase the security an organization creates for itself, but do agree that simply plugging them in, and poorly managing them, won't ultimately provide much value to the organization. Without proper understanding and continual compelling reinforcement, people, and the processes those people execute, are the weakest link to an organization's information security. It's important always to remember that information security is not a problem that a company can pay away with new tools.

    So what's next? In the next module we're going to talk about Secure Network Architecture and Design, what are secure network architecture and design, how do secure network architecture and design relate to the other modules, and why is it important to the CISSP exam and this course? I hope you found this information helpful, and I look forward to seeing you in the future. 

    Secure Network Architecture and Design

    Introduction to Secure Network Architecture and Design

    In this module, I'm going to be discussing Secure Network Architecture and Design.

    Enjoying the preview?
    Page 1 of 1