CISSP 2013 Domain: Telecommunications and Network Security New Horizons Jordan
Price: TBA
  • Duration: 4 Hours

Course details

Access to a company's resources through unauthorized means is the number one goal of most attackers. The security professional must understand the proper countermeasures in order to stop attacks on e-mail systems, over the network, and on the PBX. This course discusses the transport mechanisms, structures, and security measures used to ensure availability, confidentiality, integrity, and authentication over both public and private networks. This course guides you through the Common Body of Knowledge (CBK) recommended by the International Information Systems Security Certification Consortium (ISC2) for its Certified Information Systems Security Professional (CISSP) certification. The CISSP credential certifies student expertise in ten different knowledge domains.

  • recognize the components of a network infrastructure
  • identify the key features of firewall technologies
  • identify the characteristics of TCP/IP
  • match the layers of the OSI model to their functions
  • recognize how specific network attack techniques operate
  • propose a high level security solution for a given scenario
  • define how networks interact
  • specify the type of cable to use in a given scenario
  • recognize LAN transmission considerations
  • identify network topology characteristics
  • recognize features of media access technologies
  • classify statements as characteristics of either synchronous and asynchronous communications
  • recognize LAN and WAN specific devices and technologies
  • match the technologies used by packet-switched networks to their descriptions
  • match the remote access protocols to their functions
  • identify the characteristics of Ethernet
  • recognize how data is transmitted in Token Ring networks
  • recognize the characteristics of the network communications mechanisms and technologies used in an enterprise environment
  • identify currently available VPN protocols
  • specify the most appropriate network components for a given scenario
  • propose a network communication solution for a given scenario
  • match the network protocols to their descriptions
  • recognize how transport layer mechanisms secure network data
  • recognize how different technologies are used to protect data at the application layer
  • identify how to secure network communications in a given scenario
  • distinguish between the technologies that secure the transport and application layers
Updated on 19 February, 2018

About New Horizons Jordan

As changes in technology have accelerated, it’s become even more essential for people to master technology to be productive, invaluable employees who optimize, program and invent solutions—and even grow companies of their own. For 30 years, New Horizons has provided more than 30 million students with industry-leading technical training that delivers the most relevant and intuitive computer ctheirses and certifications. they’re now the world’s largest independent IT training company, and they continue to lead:
  • 300 computer training centers in 70 countries (and counting)
  • Largest Guaranteed-to-Run ctheirse schedule in the world
  • Ranked in the top 5% of the industry for training quality and customer satisfaction
  • Official training partner for technology leaders such as Microsoft, Cisco, CompTIA and VMware
  • Microsoft’s largest training provider, delivering more than 40% of all authorized Microsoft training worldwide
  • World’s largest Cisco-authorized training partner
See all New Horizons Jordan courses
Are you from New Horizons Jordan ? Claim your course!
Courses you can instantly connect with... Do an online course on CISSP starting now. See all courses

Is this the right course for you?

Rate this page

Didn't find what you were looking for ?

or