Communication and Network Security: CISSP, #4
()
About this ebook
Communication and Network security is the 4th domain of the CISSP certification. In this course we will cover secure network architecture and design, Supervisory Control and Data Acquisition (SCADA), network protocols, securing network components, communication channels and network attacks.
Selwyn Classen
A seasoned and highly qualified IT/IS professional with over 20 years working experience within the Petrochemical industry (i.e. Supply chain management, Knowledge management, Product and Quality management, Business analysis and processing) including the Telecommunications industry.
Read more from Selwyn Classen
Risk Management and Information Systems Control Rating: 5 out of 5 stars5/5Incident Management Rating: 0 out of 5 stars0 ratings
Related to Communication and Network Security
Titles in the series (8)
Security and Risk Management: CISSP, #1 Rating: 5 out of 5 stars5/5Asset Security: CISSP, #2 Rating: 0 out of 5 stars0 ratingsCommunication and Network Security: CISSP, #4 Rating: 0 out of 5 stars0 ratingsIdentity and Access Management: CISSP, #5 Rating: 0 out of 5 stars0 ratingsSecurity Engineering: CISSP, #3 Rating: 0 out of 5 stars0 ratingsSoftware Development Security: CISSP, #8 Rating: 0 out of 5 stars0 ratingsSecurity Assessment and Testing: CISSP, #6 Rating: 2 out of 5 stars2/5Security Operations: CISSP, #7 Rating: 0 out of 5 stars0 ratings
Related ebooks
Security Engineering: CISSP, #3 Rating: 0 out of 5 stars0 ratingsCISSP Exam Study Guide: NIST Framework, Digital Forensics & Cybersecurity Governance Rating: 5 out of 5 stars5/5(ISC)2 SSCP Systems Security Certified Practitioner Official Study Guide Rating: 0 out of 5 stars0 ratingsCISSP Exam Study Guide For Security Professionals: NIST Cybersecurity Framework, Risk Management, Digital Forensics & Governance Rating: 0 out of 5 stars0 ratingsCISSP in 21 Days - Second Edition Rating: 3 out of 5 stars3/5(ISC)2 CISSP Certified Information Systems Security Professional Official Study Guide Rating: 3 out of 5 stars3/5The Cloud Security Ecosystem: Technical, Legal, Business and Management Issues Rating: 0 out of 5 stars0 ratingsEnterprise Security: A Data-Centric Approach to Securing the Enterprise Rating: 0 out of 5 stars0 ratingsCompTIA Security+ Study Guide with over 500 Practice Test Questions: Exam SY0-701 Rating: 0 out of 5 stars0 ratingsThe Official (ISC)2 Guide to the CCSP CBK Rating: 0 out of 5 stars0 ratingsCybersecurity for Beginners : Learn the Fundamentals of Cybersecurity in an Easy, Step-by-Step Guide: 1 Rating: 0 out of 5 stars0 ratingsCybersecurity Jobs & Career Paths: Find Cybersecurity Jobs, #2 Rating: 0 out of 5 stars0 ratingsThe Official (ISC)2 Guide to the CCSP CBK Rating: 0 out of 5 stars0 ratingsFramework for SCADA Cybersecurity Rating: 5 out of 5 stars5/5CompTIA Security+ Study Guide: Exam SY0-601 Rating: 5 out of 5 stars5/5Securing Critical Infrastructures Rating: 0 out of 5 stars0 ratingsEleventh Hour Network+: Exam N10-004 Study Guide Rating: 5 out of 5 stars5/5CISA EXAM-Testing Concept-Firewall Rating: 3 out of 5 stars3/5Asset Security: CISSP, #2 Rating: 0 out of 5 stars0 ratingsSecurity Assessment and Testing: CISSP, #6 Rating: 2 out of 5 stars2/5Security Operations: CISSP, #7 Rating: 0 out of 5 stars0 ratingsIdentity and Access Management: CISSP, #5 Rating: 0 out of 5 stars0 ratingsSoftware Development Security: CISSP, #8 Rating: 0 out of 5 stars0 ratingsCISSP Study Guide Rating: 0 out of 5 stars0 ratingsOperationalizing Information Security: Putting the Top 10 SIEM Best Practices to Work Rating: 0 out of 5 stars0 ratingsCISSP® Study Guide Rating: 3 out of 5 stars3/5SSCP Systems Security Certified Practitioner Study Guide and DVD Training System Rating: 0 out of 5 stars0 ratingsCompTIA Cloud+ Study Guide: Exam CV0-002 Rating: 0 out of 5 stars0 ratings
Teaching Methods & Materials For You
Dumbing Us Down - 25th Anniversary Edition: The Hidden Curriculum of Compulsory Schooling Rating: 4 out of 5 stars4/5Lies My Teacher Told Me: Everything Your American History Textbook Got Wrong Rating: 4 out of 5 stars4/5Closing of the American Mind Rating: 4 out of 5 stars4/5Speed Reading: Learn to Read a 200+ Page Book in 1 Hour: Mind Hack, #1 Rating: 5 out of 5 stars5/5Becoming Cliterate: Why Orgasm Equality Matters--And How to Get It Rating: 4 out of 5 stars4/5The Lost Tools of Learning Rating: 5 out of 5 stars5/5Grit: The Power of Passion and Perseverance Rating: 4 out of 5 stars4/5Jack Reacher Reading Order: The Complete Lee Child’s Reading List Of Jack Reacher Series Rating: 4 out of 5 stars4/5The 5 Love Languages of Children: The Secret to Loving Children Effectively Rating: 4 out of 5 stars4/5Principles: Life and Work Rating: 4 out of 5 stars4/5Weapons of Mass Instruction: A Schoolteacher's Journey Through the Dark World of Compulsory Schooling Rating: 4 out of 5 stars4/5Fluent in 3 Months: How Anyone at Any Age Can Learn to Speak Any Language from Anywhere in the World Rating: 3 out of 5 stars3/5The Three Bears Rating: 5 out of 5 stars5/5How to Take Smart Notes. One Simple Technique to Boost Writing, Learning and Thinking Rating: 4 out of 5 stars4/5Personal Finance for Beginners - A Simple Guide to Take Control of Your Financial Situation Rating: 5 out of 5 stars5/5Inside American Education Rating: 4 out of 5 stars4/5The Chicago Guide to Grammar, Usage, and Punctuation Rating: 5 out of 5 stars5/5Financial Feminist: Overcome the Patriarchy's Bullsh*t to Master Your Money and Build a Life You Love Rating: 5 out of 5 stars5/5A study guide for Frank Herbert's "Dune" Rating: 3 out of 5 stars3/5Speed Reading: How to Read a Book a Day - Simple Tricks to Explode Your Reading Speed and Comprehension Rating: 4 out of 5 stars4/5A Failure of Nerve: Leadership in the Age of the Quick Fix (10th Anniversary, Revised Edition) Rating: 4 out of 5 stars4/5How To Be Hilarious and Quick-Witted in Everyday Conversation Rating: 5 out of 5 stars5/5Raising Human Beings: Creating a Collaborative Partnership with Your Child Rating: 4 out of 5 stars4/5The Call of the Wild and Free: Reclaiming the Wonder in Your Child's Education, A New Way to Homeschool Rating: 4 out of 5 stars4/5
Reviews for Communication and Network Security
0 ratings0 reviews
Book preview
Communication and Network Security - Selwyn Classen
While every precaution has been taken in the preparation of this book, the publisher assumes no responsibility for errors or omissions, or for damages resulting from the use of the information contained herein.
COMMUNICATION AND NETWORK SECURITY
First edition. April 2, 2020.
Copyright © 2020 Selwyn Classen.
Written by Selwyn Classen.
Table of Contents
Introduction
Communications and Network Security
What Are Communications and Network Security and What's Next?
Secure Network Architecture and Design
Introduction to Secure Network Architecture and Design
Network Security Defined
The Open System Interconnect (OSI) Model
Physical Layer
Data Link Layer
Network Layer
Transport Layer
Session Layer
Presentation Layer
Application Layer
OSI Model vs. TCP/IP Model
Internet Protocol (IP) Networking
IP Classes and CIDR
Ports
Network Topologies
High-level Network Zone Concepts
Common Network Services
Summary and What’s Next
Supervisory Control and Data Acquisition (SCADA)
Introduction to Supervisory Control and Data Acquisition
Supervisory Control and Data Acquisition Defined
Components of SCADA
SCADA Security Concerns
Summary and What’s Next
Network Protocols
Introduction to Network Protocols
Network Protocols Defined
Storage-focused Network Protocols
Multi-protocol Label Switching (MPLS)
Voice Over Internet Protocol (VoIP)
Wireless Connectivity
Cryptography Defined
Forms of Cryptography
Benefits of Asymmetric Cryptography
Public Key Infrastructure (PKI)
Digital Signatures
Certificate Hierarchies and Chains
Summary and What’s Next
Securing Network Components
Introduction to Securing Network Components
Securing Network Components Defined
High-Security Value Network Components
Routers
Switches
Virtual Private Network (VPN) Concentrators
Modems
Common Transmission Mediums
Common Firewall Types
Packet Filtering Firewalls
Stateful Inspection Firewalls
Application Firewalls
'Next Generation' Firewalls
Address Translation
Proxies
Summary and What’s Next
Communication Channels
Introduction to Communication Channels
Circuit vs. Packet Networks
Carrier Sense Multiple Access
Token Passing
Common Layer Two Networking Protocols
Ethernet
Token Ring
Fibre Distributed Data Interface
Wide Area Networking
Integrated Services Digital Network
Asynchronous Transfer Mode
Digital Subscriber Line
Cable Modem
X.25
Frame Relay
T, E, and OC
Common Electronic Communication Methods
Analog vs. Digital
Voice Communication Channel
Instant Messaging and Chat Rooms
Peer to Peer Sharing
Virtual Meetings
Common Virtual Private Network Methods
Point to Point Tunneling Protocol
Layer Two Tunneling Protocol
Internet Protocol Security
Transport Mode vs. Tunnel Mode
Secure Sockets Layering
Common Remote Access Methods
Telnet
rlogin
Secure Shell
Terminal Services
Virtual Local Area Networks
Private VLANs
Secondary VLAN Subtypes
Summary and What’s Next
Network Attacks
Introduction to Network Attacks
Themes of Network Attacks
Reconnaissance
Spamming
Spoofing
Packet Manipulation
Session Hijacking
Denial of Service
Tools and Techniques for Network Defense
Intrusion Detection / Prevention Systems
Security Information and Event Management
Vulnerability Management and Penetration Testing
Summary and What’s Next
Introduction
Communications and Network Security
In this course, we'll be going to be discussing Communications and Network Security. To start, communications and network security is one of the 8 domains of the Certified Information Systems Security Professional certification (CISSP). In this course, we'll cover the four topics of Communications and Network Security domain, across six modules. Specifically, we'll cover the following, Secure Network Architecture and Design, Supervisory Control and Data Acquisition (SCADA), Network Protocols, Securing Network Components, Communication Channels, and Network Attacks.
What Are Communications and Network Security and What's Next?
To start, this quote can help with an underlying point on information security. Kevin Mitnick, who is a relatively famous computer security expert, who was imprisoned for some of his activities, has previously stated that Companies spend millions of dollars on firewalls, encryption and secure access devices, and its money wasted because none of these measures addresses the weakest link in the security chain.
I don't completely agree with this statement as these devices can greatly increase the security an organization creates for itself, but do agree that simply plugging them in, and poorly managing them, won't ultimately provide much value to the organization. Without proper understanding and continual compelling reinforcement, people, and the processes those people execute, are the weakest link to an organization's information security. It's important always to remember that information security is not a problem that a company can pay away with new tools.
So what's next? In the next module we're going to talk about Secure Network Architecture and Design, what are secure network architecture and design, how do secure network architecture and design relate to the other modules, and why is it important to the CISSP exam and this course? I hope you found this information helpful, and I look forward to seeing you in the future.
Secure Network Architecture and Design
Introduction to Secure Network Architecture and Design
In this module, I'm going to be discussing Secure Network Architecture and Design.