Informações sobre o curso
7,384 visualizações recentes

100% on-line

Comece imediatamente e aprenda em seu próprio cronograma.

Prazos flexíveis

Redefinir os prazos de acordo com sua programação.

Nível iniciante

Aprox. 14 horas para completar

Sugerido: 5 hours/week...

Inglês

Legendas: Inglês
Os alunos que estão fazendo este Course são
  • Customer Care Reps
  • IT Support
  • Technical Support Associates
  • Engineers
  • Software Engineers

100% on-line

Comece imediatamente e aprenda em seu próprio cronograma.

Prazos flexíveis

Redefinir os prazos de acordo com sua programação.

Nível iniciante

Aprox. 14 horas para completar

Sugerido: 5 hours/week...

Inglês

Legendas: Inglês

Programa - O que você aprenderá com este curso

Semana
1
7 horas para concluir

Understand Security Issues Related to Networks

26 vídeos (Total 168 mín.), 23 leituras, 1 teste
26 videos
Understand Security Issues: OSI Model (Layers 4, 5, 6, and 7)4min
Understand Security Issues: OSI Model (Layers 1,2, and 3)4min
Understand Security Issues: OSI Model7min
Understand Security Issues: Layers Review4min
Understand Security Issues: Layers Review7min
Understand Security Issues: IP Networking5min
Understand Security Issues: Network Classes11min
Understand Security Issues: IPv65min
Understand Security Issues: DHCP3min
Understand Security Issues: DHCP6min
Understand Security Issues: ICMP6min
Understand Security Issues: Ping Scanning6min
Understand Security Issues: RPC5min
Understand Security Issues: Ring7min
Understand Security Issues: Unicast, Multicast, and Broadcast Transmissions6min
Understand Security Issues: Packet-Switched Networks4min
Understand Security Issues: CSMA8min
Understand Security Issues: FDDI5min
Understand Security Issues: DNS5min
Understand Security Issues: DNS12min
Understand Security Issues: DNS Quick Reference6min
Understand Security Issues: FTP4min
Understand Security Issues: Proxies7min
Understand Security Issues: HTTP Tunneling5min
Understand Security Issues: SCADA Attacks6min
23 leituras
Networks and Communications Security10min
Understand Security Issues: OSI Model (Layers 4, 5, 6, and 7)10min
Understand Security Issues: OSI Model (Layers 1,2, and 3)10min
Understand Security Issues: Layers Review10min
Understand Security Issues: Layers Review10min
Understand Security Issues: IP Networking10min
Understand Security Issues: Network Classes10min
Understand Security Issues: IPv610min
Understand Security Issues: DHCP10min
Understand Security Issues: DHCP10min
Understand Security Issues: ICMP10min
Understand Security Issues: Ping Scanning10min
Understand Security Issues: RPC10min
Understand Security Issues: Ring10min
Understand Security Issues: Unicast, Multicast, and Broadcast Transmissions10min
Understand Security Issues: Packet-Switched Networks10min
Understand Security Issues: CSMA10min
Understand Security Issues: FDDI10min
Understand Security Issues: DNS Quick Reference10min
Understand Security Issues: FTP10min
Understand Security Issues: Proxies10min
Understand Security Issues: HTTP Tunneling10min
Understand Security Issues: SCADA Attacks10min
1 exercício prático
Quiz 120min
Semana
2
4 horas para concluir

Protect Telecommunications Technologies and Control Network Access

13 vídeos (Total 88 mín.), 13 leituras, 1 teste
13 videos
Protect Telecommunications Technologies: MPLS7min
Protect Telecommunications Technologies: MPLS L3 VPNs6min
Protect Telecommunications Technologies: SIP14min
Control Network Access: Access Control and Monitoring7min
Control Network Access: Blind Spoofing5min
Control Network Access: Bastion Host5min
Control Network Access: Wired Transmissions6min
Control Network Access: Patch Panels5min
Control Network Access: Remote Meeting Technology6min
Control Network Access: PPTP5min
Control Network Access: SNMP4min
Control Network Access: Virtual Network Terminal Services6min
13 leituras
Protect Telecommunications Technologies: IP Convergence10min
Protect Telecommunications Technologies: MPLS10min
Protect Telecommunications Technologies: MPLS L3 VPNs10min
Protect Telecommunications Technologies: SIP10min
Control Network Access: Access Control and Monitoring10min
Control Network Access: Blind Spoofing10min
Control Network Access: Bastion Host10min
Control Network Access: Wired Transmissions10min
Control Network Access: Patch Panels10min
Control Network Access: Remote Meeting Technology10min
Control Network Access: PPTP10min
Control Network Access: SNMP10min
Control Network Access: Virtual Network Terminal Services10min
1 exercício prático
Quiz 220min
Semana
3
3 horas para concluir

Operate and Configure Network-Based Security Devices

11 vídeos (Total 62 mín.), 11 leituras, 1 teste
11 videos
Network-Based Security Devices: Availability3min
Network-Based Security Devices: Open Mail Relay Servers5min
Network-Based Security Devices: NAT7min
Network-Based Security Devices: Proxies5min
Network-Based Security Devices: FIN, NULL, and XMAS Scanning5min
Network-Based Security Devices: IDS6min
Network-Based Security Devices: IP Fragmentation Attacks and Crafted Packets4min
Network-Based Security Devices: Smurf and Fraggle Attacks6min
Network-Based Security Devices: DoS5min
Network-Based Security Devices: Manipulation of DNS Queries5min
11 leituras
Network-Based Security Devices: Network as a Bastion of Defense10min
Network-Based Security Devices: Availability10min
Network-Based Security Devices: Open Mail Relay Servers10min
Network-Based Security Devices: NAT10min
Network-Based Security Devices: Proxies10min
Network-Based Security Devices: FIN, NULL, and XMAS Scanning10min
Network-Based Security Devices: IDS10min
Network-Based Security Devices: IP Fragmentation Attacks and Crafted Packets10min
Network-Based Security Devices: Smurf and Fraggle Attacks10min
Network-Based Security Devices: DoS10min
Network-Based Security Devices: Manipulation of DNS Queries10min
1 exercício prático
Quiz 312min
Semana
4
3 horas para concluir

Manage LAN-Based Security and Implement and Operate Wireless Technologies

10 vídeos (Total 68 mín.), 10 leituras, 1 teste
10 videos
LAN-Based Security: Segmentation6min
LAN-Based Security: How Does Tagging Work?5min
LAN-Based Security: Common Attacks Against the Data-Link Layer6min
LAN-Based Security: Secure Device Management6min
LAN-Based Security: DNSSEC8min
Implement and Operate Wireless Technologies: Types of Wireless Technologies6min
Implement and Operate Wireless Technologies: TDMA6min
Implement and Operate Wireless Technologies: Infrastructure Mode7min
Implement and Operate Wireless Technologies: Share Key Authentication Flaw6min
10 leituras
LAN-Based Security: Separation of Data Plane and Control Plane10min
LAN-Based Security: Segmentation10min
LAN-Based Security: How Does Tagging Work?10min
LAN-Based Security: Common Attacks Against the Data-Link Layer10min
LAN-Based Security: Secure Device Management10min
LAN-Based Security: DNSSEC10min
Implement and Operate Wireless Technologies: Types of Wireless Technologies10min
Implement and Operate Wireless Technologies: TDMA10min
Implement and Operate Wireless Technologies: Infrastructure Mode10min
Implement and Operate Wireless Technologies: Share Key Authentication Flaw10min
1 exercício prático
Quiz 416min
4.7
11 avaliaçõesChevron Right

Principais avaliações do Networks and Communications Security

por GBJul 3rd 2018

Great course. The instructor was clearly a subject matter expert who broke it down so it was easy to understand. Thank you.

por RDMar 22nd 2019

It was really a good and beneficial course. I literally have learned many new things.

Instrutores

Avatar

(ISC)² Education & Training

Education & Training

Sobre (ISC)²

(ISC)² is an international nonprofit membership association focused on inspiring a safe and secure cyber world. Best known for the acclaimed Certified Information Systems Security Professional (CISSP®) certification, (ISC)2 offers a portfolio of credentials that are part of a holistic, programmatic approach to security. www.isc2.org ...

Sobre (ISC)² Systems Security Certified Practitioner (SSCP)

Pursue better IT security job opportunities and prove knowledge with confidence. The SSCP Professional Training Certificate shows employers you have the IT security foundation to defend against cyber attacks – and puts you on a clear path to earning SSCP certification. Learn on your own schedule with 120-day access to content aligned with the latest (ISC)2 SSCP exam domains. We’re offering the complete online self-paced program for only $1,000 – a $200 savings when you get all domains bundled together. 3 Steps to Career Advancement 1. Register for the course 2. Gain access for 120 days 3. Register and sit for the SSCP certification exam Upon completing the SSCP Professional Certificate, you will: 1. Complete six courses of preparing you to sit for the Systems Security Certified Practitioner (SSCP) certification exam as outlined below. Course 1 - Access Controls Course 2 - Security Operations and Administration Course 3 - Risk Identification, Monitoring, and Analysis/Incident Response and Recovery Course 4 - Cryptography Course 5 - Network and Communication Security Course 6 - Systems and Application Security 2. Receive a certificate of program completion. 3. Understand how to implement, monitor and administer an organization’s IT infrastructure in accordance with security policies and procedures that ensure data confidentiality, integrity and availability....
(ISC)² Systems Security Certified Practitioner (SSCP)

Perguntas Frequentes – FAQ

  • Sim, você pode assistir uma prévia do primeiro vídeo e ver programa do curso antes de se inscrever. Você precisa comprar o curso para ter acesso ao conteúdo não incluído na prévia.

  • Se decidir se inscrever no curso antes da data de início da sessão, terá acesso a todos os vídeos das palestras e leituras do curso. Também poderá enviar tarefas assim que a sessão começar.

  • Uma vez inscrito, e tão logo sua sessão tenha iniciado, você terá acesso a todos os vídeos e outros recursos, incluindo itens de leitura e fórum de discussão do curso. Você poderá ver e enviar tarefas práticas e concluir tarefas com nota atribuída obrigatórias para obter uma nota e um Certificado de Curso.

  • Se você concluir o curso com êxito, seu Certificado de Curso eletrônico será adicionado à sua página de Participações e você poderá imprimi-lo ou adicioná-lo ao seu perfil no LinkedIn.

  • Este curso é um dos poucos oferecidos pela Coursera que está disponível apenas para alunos que tenham pago ou recebido auxílio financeiro, quando disponível.

  • The course schedule contains approximately 15 hours of content material covering lectures, reading materials, a case study, and quizzes broken up over the course of 7 weeks.

Mais dúvidas? Visite o Central de Ajuda ao Aprendiz.