Informações sobre o curso

27,534 visualizações recentes
Certificados compartilháveis
Tenha o certificado após a conclusão
100% on-line
Comece imediatamente e aprenda em seu próprio cronograma.
Prazos flexíveis
Redefinir os prazos de acordo com sua programação.
Nível iniciante
Aprox. 20 horas para completar
Inglês

Instrutores

Certificados compartilháveis
Tenha o certificado após a conclusão
100% on-line
Comece imediatamente e aprenda em seu próprio cronograma.
Prazos flexíveis
Redefinir os prazos de acordo com sua programação.
Nível iniciante
Aprox. 20 horas para completar
Inglês

oferecido por

Placeholder

(ISC)²

Programa - O que você aprenderá com este curso

Semana
1

Semana 1

7 horas para concluir

Understand Security Issues Related to Networks

7 horas para concluir
26 vídeos (Total 168 mín.), 23 leituras, 1 teste
26 videos
Understand Security Issues: OSI Model (Layers 4, 5, 6, and 7)4min
Understand Security Issues: OSI Model (Layers 1,2, and 3)4min
Understand Security Issues: OSI Model7min
Understand Security Issues: Layers Review4min
Understand Security Issues: Layers Review7min
Understand Security Issues: IP Networking5min
Understand Security Issues: Network Classes11min
Understand Security Issues: IPv65min
Understand Security Issues: DHCP3min
Understand Security Issues: DHCP6min
Understand Security Issues: ICMP6min
Understand Security Issues: Ping Scanning6min
Understand Security Issues: RPC5min
Understand Security Issues: Ring7min
Understand Security Issues: Unicast, Multicast, and Broadcast Transmissions6min
Understand Security Issues: Packet-Switched Networks4min
Understand Security Issues: CSMA8min
Understand Security Issues: FDDI5min
Understand Security Issues: DNS5min
Understand Security Issues: DNS12min
Understand Security Issues: DNS Quick Reference6min
Understand Security Issues: FTP4min
Understand Security Issues: Proxies7min
Understand Security Issues: HTTP Tunneling5min
Understand Security Issues: SCADA Attacks6min
23 leituras
Networks and Communications Security10min
Understand Security Issues: OSI Model (Layers 4, 5, 6, and 7)10min
Understand Security Issues: OSI Model (Layers 1,2, and 3)10min
Understand Security Issues: Layers Review10min
Understand Security Issues: Layers Review10min
Understand Security Issues: IP Networking10min
Understand Security Issues: Network Classes10min
Understand Security Issues: IPv610min
Understand Security Issues: DHCP10min
Understand Security Issues: DHCP10min
Understand Security Issues: ICMP10min
Understand Security Issues: Ping Scanning10min
Understand Security Issues: RPC10min
Understand Security Issues: Ring10min
Understand Security Issues: Unicast, Multicast, and Broadcast Transmissions10min
Understand Security Issues: Packet-Switched Networks10min
Understand Security Issues: CSMA10min
Understand Security Issues: FDDI10min
Understand Security Issues: DNS Quick Reference10min
Understand Security Issues: FTP10min
Understand Security Issues: Proxies10min
Understand Security Issues: HTTP Tunneling10min
Understand Security Issues: SCADA Attacks10min
1 exercício prático
Quiz 130min
Semana
2

Semana 2

4 horas para concluir

Protect Telecommunications Technologies and Control Network Access

4 horas para concluir
13 vídeos (Total 88 mín.), 13 leituras, 1 teste
13 videos
Protect Telecommunications Technologies: MPLS7min
Protect Telecommunications Technologies: MPLS L3 VPNs6min
Protect Telecommunications Technologies: SIP14min
Control Network Access: Access Control and Monitoring7min
Control Network Access: Blind Spoofing5min
Control Network Access: Bastion Host5min
Control Network Access: Wired Transmissions6min
Control Network Access: Patch Panels5min
Control Network Access: Remote Meeting Technology6min
Control Network Access: PPTP5min
Control Network Access: SNMP4min
Control Network Access: Virtual Network Terminal Services6min
13 leituras
Protect Telecommunications Technologies: IP Convergence10min
Protect Telecommunications Technologies: MPLS10min
Protect Telecommunications Technologies: MPLS L3 VPNs10min
Protect Telecommunications Technologies: SIP10min
Control Network Access: Access Control and Monitoring10min
Control Network Access: Blind Spoofing10min
Control Network Access: Bastion Host10min
Control Network Access: Wired Transmissions10min
Control Network Access: Patch Panels10min
Control Network Access: Remote Meeting Technology10min
Control Network Access: PPTP10min
Control Network Access: SNMP10min
Control Network Access: Virtual Network Terminal Services10min
1 exercício prático
Quiz 230min
Semana
3

Semana 3

3 horas para concluir

Operate and Configure Network-Based Security Devices

3 horas para concluir
11 vídeos (Total 62 mín.), 11 leituras, 1 teste
11 videos
Network-Based Security Devices: Availability3min
Network-Based Security Devices: Open Mail Relay Servers5min
Network-Based Security Devices: NAT7min
Network-Based Security Devices: Proxies5min
Network-Based Security Devices: FIN, NULL, and XMAS Scanning5min
Network-Based Security Devices: IDS6min
Network-Based Security Devices: IP Fragmentation Attacks and Crafted Packets4min
Network-Based Security Devices: Smurf and Fraggle Attacks6min
Network-Based Security Devices: DoS5min
Network-Based Security Devices: Manipulation of DNS Queries5min
11 leituras
Network-Based Security Devices: Network as a Bastion of Defense10min
Network-Based Security Devices: Availability10min
Network-Based Security Devices: Open Mail Relay Servers10min
Network-Based Security Devices: NAT10min
Network-Based Security Devices: Proxies10min
Network-Based Security Devices: FIN, NULL, and XMAS Scanning10min
Network-Based Security Devices: IDS10min
Network-Based Security Devices: IP Fragmentation Attacks and Crafted Packets10min
Network-Based Security Devices: Smurf and Fraggle Attacks10min
Network-Based Security Devices: DoS10min
Network-Based Security Devices: Manipulation of DNS Queries10min
1 exercício prático
Quiz 330min
Semana
4

Semana 4

3 horas para concluir

Manage LAN-Based Security and Implement and Operate Wireless Technologies

3 horas para concluir
10 vídeos (Total 68 mín.), 10 leituras, 1 teste
10 videos
LAN-Based Security: Segmentation6min
LAN-Based Security: How Does Tagging Work?5min
LAN-Based Security: Common Attacks Against the Data-Link Layer6min
LAN-Based Security: Secure Device Management6min
LAN-Based Security: DNSSEC8min
Implement and Operate Wireless Technologies: Types of Wireless Technologies6min
Implement and Operate Wireless Technologies: TDMA6min
Implement and Operate Wireless Technologies: Infrastructure Mode7min
Implement and Operate Wireless Technologies: Share Key Authentication Flaw6min
10 leituras
LAN-Based Security: Separation of Data Plane and Control Plane10min
LAN-Based Security: Segmentation10min
LAN-Based Security: How Does Tagging Work?10min
LAN-Based Security: Common Attacks Against the Data-Link Layer10min
LAN-Based Security: Secure Device Management10min
LAN-Based Security: DNSSEC10min
Implement and Operate Wireless Technologies: Types of Wireless Technologies10min
Implement and Operate Wireless Technologies: TDMA10min
Implement and Operate Wireless Technologies: Infrastructure Mode10min
Implement and Operate Wireless Technologies: Share Key Authentication Flaw10min
1 exercício prático
Quiz 430min

Avaliações

Principais avaliações do NETWORKS AND COMMUNICATIONS SECURITY

Visualizar todas as avaliações

Sobre (ISC)² Systems Security Certified Practitioner (SSCP)

(ISC)² Systems Security Certified Practitioner (SSCP)

Perguntas Frequentes – FAQ

Mais dúvidas? Visite o Central de Ajuda ao Aprendiz.