Home| All soft| Last soft| Your Orders| Customers opinion| Helpdesk| Cart

Program Search:


Shopping Cart:




*Note: Minimum order price: €20
We Recommend:

Pluralsight Evan Morgan CISSP Communications and Network Security €10 buy download

2016
Pluralsight
Evan Morgan
1:39
English


This course will help you to earn your CISSP® and deep-dive into the Communications and Network Security domain of the Certified Information Systems Security Professional (CISSP®) certification.

If you want to learn practical communications and network security skills while preparing for your CISSP®, this course will show you how! Deep dive into the Communications and Network Security domain of the Certified Information Systems Security Professional (CISSP®) certification. You'll gain knowledge and skills in the areas of secure network architecture and design as well as supervisory control and data acquisition (SCADA). Next, you'll go over network protocols and securing their components. Finally, you'll learn more about communication channels and network attacks. By the end of this course, you will be more prepared for the CISSP exam and you'll also be more knowledgeable when it comes to communications and network security.

Course Overview
1m 2s
Course Overview 1m 2s
Introduction
1m 54s
CISSP® - Communications and Network Security 0m 41s
What Is Communications and Network Security and What's Next? 1m 12s
Secure Network Architecture and Design
21m 24s
Introduction to Secure Network Architecture and Design 1m 21s
Network Security Defined 1m 15s
The Open System Interconnect (OSI) Model 0m 27s
Physical Layer 0m 25s
Data Link Layer 0m 35s
Network Layer 0m 51s
Transport Layer 0m 46s
Session Layer 0m 29s
Presentation Layer 0m 25s
Application Layer 0m 52s
OSI Model vs. TCP/IP Model 0m 59s
Internet Protocol (IP) Networking 1m 56s
IP Classes and CIDR 2m 12s
Ports 1m 14s
Network Topologies 1m 51s
High-level Network Zone Concepts 2m 40s
Common Network Services 2m 17s
Summary and What’s Next 0m 42s
Supervisory Control and Data Acquisition (SCADA)
5m 17s
Introduction to Supervisory Control and Data Acquisition 0m 55s
Supervisory Control and Data Acquisition Defined 0m 49s
Components of SCADA 1m 10s
SCADA Security Concerns 1m 49s
Summary and What’s Next 0m 32s
Network Protocols
16m 42s
Introduction to Network Protocols 1m 8s
Network Protocols Defined 0m 30s
Storage-focused Network Protocols 1m 24s
Multi-protocol Label Switching (MPLS) 1m 2s
Voice Over Internet Protocol (VoIP) 0m 59s
Wireless Connectivity 3m 27s
Cryptography Defined 0m 40s
Forms of Cryptography 2m 20s
Benefits of Asymmetric Cryptography 0m 45s
Public Key Infrastructure (PKI) 0m 51s
Digital Signatures 1m 17s
Certificate Hierarchies and Chains 1m 31s
Summary and What’s Next 0m 41s
Securing Network Components
12m 50s
Introduction to Securing Network Components 1m 1s
Securing Network Components Defined 0m 46s
High Security Value Network Components 0m 17s
Routers 0m 56s
Switches 0m 44s
Virtual Private Network (VPN) Concentrators 1m 0s
Modems 0m 42s
Common Transmission Mediums 1m 6s
Common Firewall Types 0m 14s
Packet Filtering Firewalls 0m 46s
Stateful Inspection Firewalls 1m 6s
Application Firewalls 0m 40s
'Next Generation' Firewalls 0m 54s
Address Translation 1m 0s
Proxies 0m 55s
Summary and What’s Next 0m 38s
Communication Channels
26m 59s
Introduction to Communication Channels 1m 5s
Circuit vs. Packet Networks 0m 50s
Carrier Sense Multiple Access 1m 0s
Token Passing 0m 24s
Common Layer Two Networking Protocols 0m 15s
Ethernet 0m 35s
Token Ring 0m 27s
Fiber Distributed Data Interface 0m 43s
Wide Area Networking 0m 28s
Integrated Services Digital Network 1m 4s
Asynchronous Transfer Mode 0m 56s
Digital Subscriber Line 0m 48s
Cable Modem 0m 42s
X.25 0m 47s
Frame Relay 0m 39s
T, E, and OC 0m 40s
Common Electronic Communication Methods 0m 17s
Analog vs. Digital 1m 7s
Voice Communication Channel 1m 39s
Email 0m 58s
Instant Messaging and Chat Rooms 0m 56s
Peer to Peer Sharing 0m 45s
Virtual Meetings 0m 36s
Common Virtual Private Network Methods 0m 23s
Point to Point Tunneling Protocol 0m 25s
Layer Two Tunneling Protocol 0m 24s
Internet Protocol Security 0m 36s
Transport Mode vs. Tunnel Mode 1m 6s
Secure Sockets Layering 0m 51s
Common Remote Access Methods 0m 16s
Telnet 0m 44s
rlogin 0m 31s
Secure Shell 0m 36s
Terminal Services 0m 33s
Virtual Local Area Networks 0m 33s
Private VLANs 0m 33s
Secondary VLAN Subtypes 0m 46s
Summary and What’s Next 0m 43s
Network Attacks
13m 2s
Introduction to Network Attacks 0m 44s
Themes of Network Attacks 0m 18s
Reconnaissance 0m 57s
Spamming 0m 29s
Spoofing 1m 44s
Packet Manipulation 1m 8s
Session Hijacking 0m 45s
Denial of Service 1m 47s
Tools and Techniques for Network Defense 0m 24s
Intrusion Detection / Prevention Systems 1m 39s
Security Information and Event Management 1m 8s
Vulnerability Management and Penetration Testing 1m 6s
Summary and What’s Next 0m 48s

pluralsight.com/courses/cissp-communications-network-security



Download File Size:170.51 MB


Pluralsight Evan Morgan CISSP Communications and Network Security
€10
Customers who bought this program also bought:

Home| All Programs| Today added Progs| Your Orders| Helpdesk| Shopping cart      





Adobe Acrobat Pro DC 2022 €70


Mathworks MATLAB R2022 €105


Adobe Acrobat Pro DC 2022 for Mac €70






9327 Fantasy & Sci-Fi eBooks Collection 9327 PDF Books eBook €60


Cambridge University History Collection PDF eBooks €100

                   





Autodesk Revit 2023 €140

             

Autodesk Product Design Suite Ultimate €252