Exploring SSCP Domain 6: Network and Communications Security for a Career in IT Security - PowerPoint PPT Presentation

About This Presentation
Title:

Exploring SSCP Domain 6: Network and Communications Security for a Career in IT Security

Description:

Domain 6 of the SSCP certification exam is Network and Communications Security. The Network and Communications Security domain comprise a weightage of 16% in the SSCP certification exam. – PowerPoint PPT presentation

Number of Views:32

less

Transcript and Presenter's Notes

Title: Exploring SSCP Domain 6: Network and Communications Security for a Career in IT Security


1
Exploring SSCP Domain 6 Network and
Communications Security for a Career in IT
Security
www.infosectrain.com sales_at_infosectrain.com
2
An effective network and communications security
solution lower the danger of data theft and
sabotage in the workplace. Protecting your
workstations from spyware is more accessible with
network security. It also ensures the security of
shared information. A cybersecurity
professionals job includes a substantial amount
of network and communications security. This
article will cover the sixth domain of SSCP
Network and Communications Security, and what you
can expect in the SSCP exam from this domain.
www.infosectrain.com sales_at_infosectrain.com
3
www.infosectrain.com sales_at_infosectrain.com
4
Domains of SSCP
www.infosectrain.com sales_at_infosectrain.com
5
  • The seven SSCP domains are
  • Domain 1 Access Controls (16)
  • Domain 2 Security Operations and
    Administration (15)
  • Domain 3 Risk Identification, Monitoring, and
    Analysis (15)
  • Domain 4 Incident Response and Recovery (13)
  • Domain 5 Cryptography (10)
  • Domain 6 Network and Communications Security
    (16)
  • Domain 7 Systems and Application Security (15)

www.infosectrain.com sales_at_infosectrain.com
6
Domain 6 Network and Communications
Security Domain 6 of the SSCP certification exam
is Network and Communications Security. The
Network and Communications Security domain
comprise a weightage of 16 in the SSCP
certification exam. This domain will introduce
network models and hardware devices and the
structure of data that flows over and through
these devices. IT networks are composed of
various hardware devices put together in
different ways to form topologies, which are
network models. Network devices use
telecommunications signaling systems to transmit
data between users and through devices. This area
will cover wireless and cellular technology, the
Bring Your Own Device concept and connecting
personal digital devices to the workplace
network. It will also cover convergent network
communications, such as voice and media across a
digital network, and the prioritizing of data
that travels across a network. The subtopics
covered in Network and Communications Security
domain are




www.infosectrain.com sales_at_infosectrain.com
7
  • Understand and apply fundamental concepts of
    networking
  • Understand network attacks and countermeasures
  • Manage network access controls
  • Manage network security
  • Operate and configure network-based security
    devices
  • Operate and configure wireless technologies





www.infosectrain.com sales_at_infosectrain.com
8
1. Understand and Apply Fundamental Concepts of
Networking This subsection will provide in-depth
knowledge of the fundamental concepts of
networking and introduce the design and
implementation of network devices, protocols, and
telecommunication services to transfer data
through public and private networks. It will
discuss the VPN technologies, OSI and TCP/IP
models, and other related protocols in-depth.
This subsection will look at network topologies
and the different topologies, such as star, bus,
and ring. Firewalls, routers, switches, gateways,
and proxies are part of network hardware and
access points. It will also cover the different
data transmission media types such as fiber
optic, coaxial, twisted-pair cable, etc., and the
commonly used ports and protocols.




www.infosectrain.com sales_at_infosectrain.com
9
2. Understand Network Attacks and
Countermeasures This subsection will go over how
to set up network security devices and recognize
various forms of network attacks. This section
will discuss the methods for preventing
network-based attacks, detecting intrusions, and
employing countermeasures that may be required to
combat such attacks. This section will also cover
ARP, brute force, worms, flooding, eavesdropping,
sniffers, spamming, Dos/DDOS, and Spoofing. 3.
Manage Network Access Controls This subsection
will explain the various network access control
systems and how they should be managed and used
to safeguard the system and data utilizing
various confidentiality, integrity, and
availability levels. It will cover the different
network access control standards and protocols.
This section will address understanding and
working with remote access technologies,
including RADIUS and TACACS, and basic network
theory and operating information. This section
also covers essential security functions such as
email security and the use of NAT and VPNs.




www.infosectrain.com sales_at_infosectrain.com
10
4. Manage Network SecurityThis subsection will
discuss the security measures used to ensure the
integrity, availability, authentication, and
confidentiality of the transmitted or
communicated data. This section will cover the
many methods of providing network services and
the security that comes with them. Some are Frame
Relay, X.25, ISDN, Synchronous Data Link Control
(SDLC), and High-Level Data Link Control (HDLC).
It will go over the physical and logical
placement of network devices concerned with the
transmission of data. It will also cover various
segmentations such as VLAN, ACLs, and more. You
will learn the advantages of VLAN and how to
implement VLAN. This section will also discuss
secure device management.




www.infosectrain.com sales_at_infosectrain.com
11
5. Operate and Configure Network-Based Security
DevicesIn this part, you will learn how to
secure your network with firewall rules, switch
and router configuration, network monitoring, and
how to protect your telecommunications and
comprehend the specific features and weaknesses
of wireless networks. This section will go over
the concepts of firewall and proxies
implementations. This section will cover network
intrusion detection and prevention systems. It
will discuss Port Scanning, TCP Sequence Number
Attacks, Network Security Tools and Tasks,
Intrusion Detection Systems (IDS), Architecture
of an Intrusion Detection System (IDS), Security
Event Management (SEM)/Security Event and
Incident Management (SEIM), Scanners, Discovery
Scanning, Compliance Scanning, Vulnerability
Scanning, and Penetration Testing, Scanning
Tools, and Network Taps. It will also cover
traffic-shaping devices.




www.infosectrain.com sales_at_infosectrain.com
12
6. Operate and Configure Wireless
TechnologiesThis subsection will discuss
transmission security in-depth. It will go over
the wireless and cellular technologies, the
procedures to set up and operate wireless
technologies, transmission security, common
vulnerabilities and countermeasures, and
different wireless security issues. It will also
cover Open System Authentication, Shared Key
Authentication, Ad Hoc mode, infrastructure mode,
Wired Equivalent Privacy Protocol (WEP), WiFi
Protected Access (WPA) and WiFi Protected Access
2 (WPA2), A Parking Lot Attack, Shared Key
Authentication Flaw, Service Set Identifier
(SSID) Flaw, Vulnerability of Wired Equivalent
Privacy Protocol (WEP), and wireless devices.




www.infosectrain.com sales_at_infosectrain.com
13
SSCP with InfosecTrain Enroll in the SSCP
certification training course at InfosecTrain. We
are one of the leading security training
providers in the world. With the help of our
highly educated and trained instructors, you may
earn prestigious ISC² SSCP certifications. You
will be able to define and identify the networks
and communications security required to secure
network structure, data transmission methods,
transport formats, and the security measures
employed to maintain the integrity, availability,
authentication, and confidentiality of the
transmitted data after completing the SSCP
certification training course.




www.infosectrain.com sales_at_infosectrain.com
14
About InfosecTrain
  • Established in 2016, we are one of the finest
    Security and Technology Training and Consulting
    company
  • Wide range of professional training programs,
    certifications consulting services in the IT
    and Cyber Security domain
  • High-quality technical services, certifications
    or customized training programs curated with
    professionals of over 15 years of combined
    experience in the domain

www.infosectrain.com sales_at_infosectrain.com
15
Our Endorsements
www.infosectrain.com sales_at_infosectrain.com
16
Why InfosecTrain
Global Learning Partners
Access to the recorded sessions
Certified and Experienced Instructors
Flexible modes of Training
Tailor Made Training
Post training completion
www.infosectrain.com sales_at_infosectrain.com
17
Our Trusted Clients
www.infosectrain.com sales_at_infosectrain.com
18
(No Transcript)
19
Contact us
Get your workforce reskilled by our certified and
experienced instructors!
IND 1800-843-7890 (Toll Free) / US 1
657-221-1127 / UK 44 7451 208413
sales_at_infosectrain.com
www.infosectrain.com
Write a Comment
User Comments (0)
About PowerShow.com