课程信息
4.9
7 个评分
3 个审阅
100% 在线

100% 在线

立即开始,按照自己的计划学习。
可灵活调整截止日期

可灵活调整截止日期

根据您的日程表重置截止日期。
初级

初级

完成时间(小时)

完成时间大约为16 小时

建议:5 hours/week...
可选语言

英语(English)

字幕:英语(English)
100% 在线

100% 在线

立即开始,按照自己的计划学习。
可灵活调整截止日期

可灵活调整截止日期

根据您的日程表重置截止日期。
初级

初级

完成时间(小时)

完成时间大约为16 小时

建议:5 hours/week...
可选语言

英语(English)

字幕:英语(English)

教学大纲 - 您将从这门课程中学到什么

1
完成时间(小时)
完成时间为 7 小时

Understand Security Issues Related to Networks

Module Topics: OSI and TCP/IP Models, Internet Protocol (IP) Networking, Network Topographies and Relationship, Commonly Used Ports and Protocols, and HTTP Proxying. OSI and TCP/IP Models include OSI Model, Layer 1: Physical Layer, Layer 2: Data-Link Layer, Layer 3: Network Layer, Layer 3 Protocols, Layer 4: Transport Layer, Layer 4 Protocols, Layer 5: Session Layer, Layer 6: Presentation Layer, Layer 6 Sublayers, Layer 6 Protocols, Layer 7: Application Layer, Layer 7 Protocols, and TCP/IP Reference Model. In Internet Protocol (IP) Networking you will learn about Network Classes, IPv6, Transmission Control Protocol (TCP), User Datagram Protocol (UDP), Internet-Intranet, Extranet, Dynamic Host Configuration Protocol (DHCP), Internet Control Message Protocol (ICMP), Ping of Death, ICMP Redirect Attack, Ping Scanning, Traceroute Exploitation, and Remote Procedure Calls (RPC). In Network Topographies and Relationship you will learn about Bus, Tree, Ring, Mesh, Star, Unicast, Multicast, and Broadcast Transmissions, Circuit-Switched Networks, Packet-Switched Networks, Switched Virtual Circuits (SVCs) and Permanennt Virtual Circuits (PVCs), Carrier Sense Multiple Access (CSMA), Polling, Token Passing,Eethernet (IEEE 802.3), Token Ring (IEEE 802.5), Fiber Distributed Data Interface (FDDI), Multiprotocol Label Switching (MPLS), and Local Area Network (LAN). In Commonly Used Ports and Protocols you will learn about Domain Name Service (DNS), DNS Quick Reference, Lightweight Directory Access Protocol (LDAP), LDAP Quick Reference, Network Basic Input Output System (NetBIOS), NetBIOS Quick Reference, Network Information Service (NIS), NIS+, Common Internet File System (CIFS)/Server Message Block (SMB), CIFS/SMB Quick Reference, Network File System (NFS), NFS Quick Reference, Simple Mail transfer Protocol (SMTP) and Enhanced Simple Mail Transfer Protocol (ESMTP), Comparing SMTP and ESMTP, File Transfer Protocol (FTP), FTP Quick Reference, Transfer Modes, Anonymous FTP, TFTP Quick Reference, Hypertext Transfer Protocol (HTTP), and HTTP Quick Reference. In HTTP Proxying you will learn about Anonymizing Proxies, Open Proxy Servers, Content Filtering, HTTP Tunneling, Implication of Multilayer Protocols, Supervisory Control and Data Acquisition (SCADA), SCADA System Components, SCADA Attacks, Defensive Actions, and Modbus. ...
Reading
26 个视频 (总计 168 分钟), 23 个阅读材料, 1 个测验
Video26 个视频
Understand Security Issues: OSI Model (Layers 4, 5, 6, and 7)4分钟
Understand Security Issues: OSI Model (Layers 1,2, and 3)4分钟
Understand Security Issues: OSI Model7分钟
Understand Security Issues: Layers Review4分钟
Understand Security Issues: Layers Review7分钟
Understand Security Issues: IP Networking5分钟
Understand Security Issues: Network Classes11分钟
Understand Security Issues: IPv65分钟
Understand Security Issues: DHCP3分钟
Understand Security Issues: DHCP6分钟
Understand Security Issues: ICMP6分钟
Understand Security Issues: Ping Scanning6分钟
Understand Security Issues: RPC5分钟
Understand Security Issues: Ring7分钟
Understand Security Issues: Unicast, Multicast, and Broadcast Transmissions6分钟
Understand Security Issues: Packet-Switched Networks4分钟
Understand Security Issues: CSMA8分钟
Understand Security Issues: FDDI5分钟
Understand Security Issues: DNS5分钟
Understand Security Issues: DNS12分钟
Understand Security Issues: DNS Quick Reference6分钟
Understand Security Issues: FTP4分钟
Understand Security Issues: Proxies7分钟
Understand Security Issues: HTTP Tunneling5分钟
Understand Security Issues: SCADA Attacks6分钟
Reading23 个阅读材料
Networks and Communications Security10分钟
Understand Security Issues: OSI Model (Layers 4, 5, 6, and 7)10分钟
Understand Security Issues: OSI Model (Layers 1,2, and 3)10分钟
Understand Security Issues: Layers Review10分钟
Understand Security Issues: Layers Review10分钟
Understand Security Issues: IP Networking10分钟
Understand Security Issues: Network Classes10分钟
Understand Security Issues: IPv610分钟
Understand Security Issues: DHCP10分钟
Understand Security Issues: DHCP10分钟
Understand Security Issues: ICMP10分钟
Understand Security Issues: Ping Scanning10分钟
Understand Security Issues: RPC10分钟
Understand Security Issues: Ring10分钟
Understand Security Issues: Unicast, Multicast, and Broadcast Transmissions10分钟
Understand Security Issues: Packet-Switched Networks10分钟
Understand Security Issues: CSMA10分钟
Understand Security Issues: FDDI10分钟
Understand Security Issues: DNS Quick Reference10分钟
Understand Security Issues: FTP10分钟
Understand Security Issues: Proxies10分钟
Understand Security Issues: HTTP Tunneling10分钟
Understand Security Issues: SCADA Attacks10分钟
Quiz1 个练习
Quiz 120分钟
2
完成时间(小时)
完成时间为 4 小时

Protect Telecommunications Technologies and Control Network Access

Module Topics for Protect Telecommunications Technologies and Control Network Access: Converged Communications, VoIP, POTS and PBX, Cellular, and Attacks and Countermeasures. In Converged Communications you will learn about IP Convergence, Implementation, Fiber Channel Over Ethernet (FCoE), iSCSI, How iSCSI Works, Multi-Protocol Label Switching (MPLS), MPLS Pseudowires, MPLS L3VPNs, MPLS VPLS, and MPLS Fast Reroute. In VoIP you will learn about Session Initiation Protocol (SIP), Packet Loss, Jitter, Sequence Errors, and Codec Quality. In POTS and PBX you will learn about POTS, PBX, and Cellular. In Attacks and Countermeasures you will learn about DDoS Attack for Hire, and SIP Flooding Attacks. Module Topics for Control Network Access: Access Control and Monitoring, Operation of Hardware, Transmission Media, Voice, Multimedia Collaboration, Open Protocols, Applications, and Services, Remote Access, Remote Access Services, Virtual Access Services and Desktops and Data Communication. In Access Control and Monitoring you will learn about Secure Routing/Deterministic Routing, Boundary Routers, Non-Blind Spoofing, Blind Spoofing, Security Perimeter, Network Partitioning, Dual-Homed Host, Bastion Host, and Demilitarized Zone (DMZ). In Operation of Hardware you will learn about Modems, Concentrators, Front-End Processors, Multiplexers, Hubs and Repeaters, Bridges and Switches, and Routers. In Transmission Media you will learn about Wired, Twisted Pair, Cable Categories, Unshielded Twisted Pair (UTP), Shielded Twisted Pair (STP), Coaxial Cable, Fiber Optic, Patch Panels, Endpoint Security, and Moble Devices. In Voice you will learn about Modems and Public Switched Telephone Networks (PSTN), and War Dialing. In Multimedia Collaboration you will learn about Peer-to-Peer (P2P) Applications and Protocols, Remote Meeting Technology, and Instant Messaging. In Open Protocols, Applications, and Services you will learn about Extensible Messaging and Presence Protocol (XMPP) and Jabber, Internet Relay Chat (IRC), Tunneling Firewalls and Other Restrictions. In Remote Access Point-to-Point Tunneling Protocol (PPTP), Layer 2 Tunneling Protocol (L2TP), Remote Authentication Dial-in User Service (RADIUS), and Simple Network Management Protocol (SNMP). In Remote Access Services you will learn about TCP/IP Terminal Emulation Protocol (TELNET), Remote Log-in (rlogin), Remote Shell (rsh), Remote Copy (rcp), and Screen Scraper. In Virtual Applications and Desktops you will be learn Virtual Network Terminal Services, Telecommuting, and Other Telecommuting Considerations. In Data Communication you will learn about Analog Communication, and Digital Communication. ...
Reading
13 个视频 (总计 88 分钟), 13 个阅读材料, 1 个测验
Video13 个视频
Protect Telecommunications Technologies: MPLS7分钟
Protect Telecommunications Technologies: MPLS L3 VPNs6分钟
Protect Telecommunications Technologies: SIP14分钟
Control Network Access: Access Control and Monitoring7分钟
Control Network Access: Blind Spoofing5分钟
Control Network Access: Bastion Host5分钟
Control Network Access: Wired Transmissions6分钟
Control Network Access: Patch Panels5分钟
Control Network Access: Remote Meeting Technology6分钟
Control Network Access: PPTP5分钟
Control Network Access: SNMP4分钟
Control Network Access: Virtual Network Terminal Services6分钟
Reading13 个阅读材料
Protect Telecommunications Technologies: IP Convergence10分钟
Protect Telecommunications Technologies: MPLS10分钟
Protect Telecommunications Technologies: MPLS L3 VPNs10分钟
Protect Telecommunications Technologies: SIP10分钟
Control Network Access: Access Control and Monitoring10分钟
Control Network Access: Blind Spoofing10分钟
Control Network Access: Bastion Host10分钟
Control Network Access: Wired Transmissions10分钟
Control Network Access: Patch Panels10分钟
Control Network Access: Remote Meeting Technology10分钟
Control Network Access: PPTP10分钟
Control Network Access: SNMP10分钟
Control Network Access: Virtual Network Terminal Services10分钟
Quiz1 个练习
Quiz 220分钟
3
完成时间(小时)
完成时间为 3 小时

Operate and Configure Network-Based Security Devices

Module Topics: The Network as a Bastion of Defense, Firewalls and Proxies, Network Intrusion Detection/Prevention Systems, DoS/DDoS, and Spoofing. In The Network as a Bastion of Defense you will learn about Key Concepts, Network Security Objectives and Attack Modes, Confidentiality, Eavesdropping (Sniffing), Integrity, Integrity, Domain Litigation, Open Mail Relay Servers, and Spam. In Firewalls and Proxies you will learn about Firewalls, Filtering, Network Address Translation (NAT), Port Address Translation (PAT), Static Packet Filtering, Stateful Inspection or Dynamic Packet Filtering, Proxies, Circuit-Level Proxy, Application-Level Proxy, and Web Proxy Servers. In Network Intrusion Detection/Prevention Systems you will learn about Port Scanning, FIN, NULL, and XMAS Scanning, TCP Sequence Number Attacks, Methodology of an Attack, Network Security Tools and Tasks, Intrusion Detection Systems (IDS), Architecture of an Intrusion Detection System (IDS), Security Event Management (SEM)/Security Event and Incident Management (SEIM), Scanners, Discovery Scanning, Compliance Scanning, Vulnerability Scanning and Penetration Testing, Scanning Tools, and Network Taps. In IP Fragmentation Attacks and Crafted Packets you will learn about Teardrop, Overlapping Fragment Attack, Source Routing Exploitation, Smurf and Fraggle Attacks, NFS Attacks, Network News Transport Protocol (NNTP) Security, Finger User Information Protocol, and Network Time Protocol (NTP). In DoS/DDoS you will learn about Denial-of-Service Attack (DoS), Distributed Denial-of-Service Attack (DDoS), and SYN Flooding. In Spoofing you will learn about IP Address Spoofing and SYN-ACK Attacks, E-Mail Spoofing, DNS Spoofing, DNS Vulnerabilities, Manipulation of DNS Queries, Information Disclosure, and Namespace-Related Risks....
Reading
11 个视频 (总计 62 分钟), 11 个阅读材料, 1 个测验
Video11 个视频
Network-Based Security Devices: Availability3分钟
Network-Based Security Devices: Open Mail Relay Servers5分钟
Network-Based Security Devices: NAT7分钟
Network-Based Security Devices: Proxies5分钟
Network-Based Security Devices: FIN, NULL, and XMAS Scanning5分钟
Network-Based Security Devices: IDS6分钟
Network-Based Security Devices: IP Fragmentation Attacks and Crafted Packets4分钟
Network-Based Security Devices: Smurf and Fraggle Attacks6分钟
Network-Based Security Devices: DoS5分钟
Network-Based Security Devices: Manipulation of DNS Queries5分钟
Reading11 个阅读材料
Network-Based Security Devices: Network as a Bastion of Defense10分钟
Network-Based Security Devices: Availability10分钟
Network-Based Security Devices: Open Mail Relay Servers10分钟
Network-Based Security Devices: NAT10分钟
Network-Based Security Devices: Proxies10分钟
Network-Based Security Devices: FIN, NULL, and XMAS Scanning10分钟
Network-Based Security Devices: IDS10分钟
Network-Based Security Devices: IP Fragmentation Attacks and Crafted Packets10分钟
Network-Based Security Devices: Smurf and Fraggle Attacks10分钟
Network-Based Security Devices: DoS10分钟
Network-Based Security Devices: Manipulation of DNS Queries10分钟
Quiz1 个练习
Quiz 312分钟
4
完成时间(小时)
完成时间为 3 小时

Manage LAN-Based Security and Implement and Operate Wireless Technologies

Module Topics for Manage LAN-Based Security: Separation of Data Plane and Control Plane, Segmentation, MACsec (IEEE 802.1AE), and Secure Device Management. In Separation of Data Plane and Control Plane you will learn about Logical Design for Control Planes. In Segmentation you will learn about Advantages of Using VLANs, Implementing VLANs/Port-Based VLANs, How Does Tagging Work? Tagging Rules, Other VLAN Classification Criteria, Protocol-Based VLANs, Subnet-Based VLANs, and Common Attacks Against the Data-Link Layer. In MACsec (IEEE 802.1AE) you will learn about How MACsec Works, Understanding Connectivity Associations and Secure Channels, Understanding Static Connectivity Association Key Security Mode, and Understanding Static Secure Association Key Security Mode. In Secure Device Management you will earn about Automated CM Tools, Secure Shell (SSH), Simple Network Management Protocol (SNMP), Ports Definitions, DNSSEC, New Record Types, RRset. Module Topics for Implement and Operate Wireless Technologies: Transmission Security and Common Vulnerabilities and Countermeasures and Wireless Security Issues. In Transmission Security and Common Vulnerabilities and Countermeasures you will learn about Types of Wireless Technologies, Types of Wireless Networks, Direct-Sequence Spread Spectrum (DSSS), Frequency-Hopping Spread Spectrum (FHSS), Orthogonal Frequency Division Multiplexing (OFDM), Vectored Orthogonal Frequency Division Multiplexing (VOFDM), Frequency Division Multiple Access (FDMA), and Time Division Multiple Access (TDMA). In Wireless Security Issues you will learn about Open System Authentication, Shared Key Authentication, Ad Hoc Mode, Infrastructure Mode, Wired Equivalent Privacy Protocol (WEP), Wi-Fi Protected Access (WPA) and Wi-Fi Protected Access 2 (WPA2), A “Parking Lot” Attack, Shared Key Authentication Flaw, Service Set Identifier (SSID) Flaw, The Vulnerability of Wired Equivalent Privacy Protocol (WEP), Attack on Temporal Key Integrity Protocol (TKIP), and Wireless Devices....
Reading
10 个视频 (总计 68 分钟), 10 个阅读材料, 1 个测验
Video10 个视频
LAN-Based Security: Segmentation6分钟
LAN-Based Security: How Does Tagging Work?5分钟
LAN-Based Security: Common Attacks Against the Data-Link Layer6分钟
LAN-Based Security: Secure Device Management6分钟
LAN-Based Security: DNSSEC8分钟
Implement and Operate Wireless Technologies: Types of Wireless Technologies6分钟
Implement and Operate Wireless Technologies: TDMA6分钟
Implement and Operate Wireless Technologies: Infrastructure Mode7分钟
Implement and Operate Wireless Technologies: Share Key Authentication Flaw6分钟
Reading10 个阅读材料
LAN-Based Security: Separation of Data Plane and Control Plane10分钟
LAN-Based Security: Segmentation10分钟
LAN-Based Security: How Does Tagging Work?10分钟
LAN-Based Security: Common Attacks Against the Data-Link Layer10分钟
LAN-Based Security: Secure Device Management10分钟
LAN-Based Security: DNSSEC10分钟
Implement and Operate Wireless Technologies: Types of Wireless Technologies10分钟
Implement and Operate Wireless Technologies: TDMA10分钟
Implement and Operate Wireless Technologies: Infrastructure Mode10分钟
Implement and Operate Wireless Technologies: Share Key Authentication Flaw10分钟
Quiz1 个练习
Quiz 416分钟
4.9
3 个审阅Chevron Right

热门审阅

创建者 GBJul 3rd 2018

Great course. The instructor was clearly a subject matter expert who broke it down so it was easy to understand. Thank you.

创建者 AOct 26th 2018

thanks for this great knowledge that you granted me in my like

讲师

Avatar

(ISC)² Education & Training

Education & Training

关于 (ISC)²

(ISC)² is an international nonprofit membership association focused on inspiring a safe and secure cyber world. Best known for the acclaimed Certified Information Systems Security Professional (CISSP®) certification, (ISC)2 offers a portfolio of credentials that are part of a holistic, programmatic approach to security. www.isc2.org ...

关于 (ISC)² Systems Security Certified Practitioner (SSCP) 专项课程

Pursue better IT security job opportunities and prove knowledge with confidence. The SSCP Professional Training Certificate shows employers you have the IT security foundation to defend against cyber attacks – and puts you on a clear path to earning SSCP certification. Learn on your own schedule with 120-day access to content aligned with the latest (ISC)2 SSCP exam domains. We’re offering the complete online self-paced program for only $1,000 – a $200 savings when you get all domains bundled together. 3 Steps to Career Advancement 1. Register for the course 2. Gain access for 120 days 3. Register and sit for the SSCP certification exam Upon completing the SSCP Professional Certificate, you will: 1. Complete six courses of preparing you to sit for the Systems Security Certified Practitioner (SSCP) certification exam as outlined below. Course 1 - Access Controls Course 2 - Security Operations and Administration Course 3 - Risk Identification, Monitoring, and Analysis/Incident Response and Recovery Course 4 - Cryptography Course 5 - Network and Communication Security Course 6 - Systems and Application Security 2. Receive a certificate of program completion. 3. Understand how to implement, monitor and administer an organization’s IT infrastructure in accordance with security policies and procedures that ensure data confidentiality, integrity and availability....
(ISC)² Systems Security Certified Practitioner (SSCP)

常见问题

  • 是的,您可以在注册之前预览第一个视频和查看授课大纲。您必须购买课程,才能访问预览不包括的内容。

  • 如果您决定在班次开始日期之前注册课程,那么您将可以访问课程的所有课程视频和阅读材料。班次开始之后,您便可以提交作业。

  • 在您注册且班次开课之后,您将可以访问所有视频和其他资源,包括阅读材料内容和课程论坛。您将能够查看和提交练习作业,并完成所需的评分作业以获得成绩和课程证书。

  • 如果您成功完成课程,您的电子课程证书将添加到您的成就页中,您可以通过该页打印您的课程证书或将其添加到您的领英档案中。

  • 此课程是 Coursera 上提供的众多课程之一,当前只对已购买课程或已获得助学金的学生开放。如果您要学习此课程,但却承担不起课程费用,我们建议您提交助学金申请。

  • The course schedule contains approximately 15 hours of content material covering lectures, reading materials, a case study, and quizzes broken up over the course of 7 weeks.

还有其他问题吗?请访问 学生帮助中心