About this Course

30,341 recent views
Shareable Certificate
Earn a Certificate upon completion
100% online
Start instantly and learn at your own schedule.
Flexible deadlines
Reset deadlines in accordance to your schedule.
Beginner Level
Approx. 20 hours to complete
English

Instructor

Shareable Certificate
Earn a Certificate upon completion
100% online
Start instantly and learn at your own schedule.
Flexible deadlines
Reset deadlines in accordance to your schedule.
Beginner Level
Approx. 20 hours to complete
English

Offered by

Placeholder

(ISC)²

Syllabus - What you will learn from this course

Week
1

Week 1

7 hours to complete

Understand Security Issues Related to Networks

7 hours to complete
26 videos (Total 168 min), 23 readings, 1 quiz
26 videos
Understand Security Issues: OSI Model (Layers 4, 5, 6, and 7)4m
Understand Security Issues: OSI Model (Layers 1,2, and 3)4m
Understand Security Issues: OSI Model7m
Understand Security Issues: Layers Review4m
Understand Security Issues: Layers Review7m
Understand Security Issues: IP Networking5m
Understand Security Issues: Network Classes11m
Understand Security Issues: IPv65m
Understand Security Issues: DHCP3m
Understand Security Issues: DHCP6m
Understand Security Issues: ICMP6m
Understand Security Issues: Ping Scanning6m
Understand Security Issues: RPC5m
Understand Security Issues: Ring7m
Understand Security Issues: Unicast, Multicast, and Broadcast Transmissions6m
Understand Security Issues: Packet-Switched Networks4m
Understand Security Issues: CSMA8m
Understand Security Issues: FDDI5m
Understand Security Issues: DNS5m
Understand Security Issues: DNS12m
Understand Security Issues: DNS Quick Reference6m
Understand Security Issues: FTP4m
Understand Security Issues: Proxies7m
Understand Security Issues: HTTP Tunneling5m
Understand Security Issues: SCADA Attacks6m
23 readings
Networks and Communications Security10m
Understand Security Issues: OSI Model (Layers 4, 5, 6, and 7)10m
Understand Security Issues: OSI Model (Layers 1,2, and 3)10m
Understand Security Issues: Layers Review10m
Understand Security Issues: Layers Review10m
Understand Security Issues: IP Networking10m
Understand Security Issues: Network Classes10m
Understand Security Issues: IPv610m
Understand Security Issues: DHCP10m
Understand Security Issues: DHCP10m
Understand Security Issues: ICMP10m
Understand Security Issues: Ping Scanning10m
Understand Security Issues: RPC10m
Understand Security Issues: Ring10m
Understand Security Issues: Unicast, Multicast, and Broadcast Transmissions10m
Understand Security Issues: Packet-Switched Networks10m
Understand Security Issues: CSMA10m
Understand Security Issues: FDDI10m
Understand Security Issues: DNS Quick Reference10m
Understand Security Issues: FTP10m
Understand Security Issues: Proxies10m
Understand Security Issues: HTTP Tunneling10m
Understand Security Issues: SCADA Attacks10m
1 practice exercise
Quiz 130m
Week
2

Week 2

4 hours to complete

Protect Telecommunications Technologies and Control Network Access

4 hours to complete
13 videos (Total 88 min), 13 readings, 1 quiz
13 videos
Protect Telecommunications Technologies: MPLS7m
Protect Telecommunications Technologies: MPLS L3 VPNs6m
Protect Telecommunications Technologies: SIP14m
Control Network Access: Access Control and Monitoring7m
Control Network Access: Blind Spoofing5m
Control Network Access: Bastion Host5m
Control Network Access: Wired Transmissions6m
Control Network Access: Patch Panels5m
Control Network Access: Remote Meeting Technology6m
Control Network Access: PPTP5m
Control Network Access: SNMP4m
Control Network Access: Virtual Network Terminal Services6m
13 readings
Protect Telecommunications Technologies: IP Convergence10m
Protect Telecommunications Technologies: MPLS10m
Protect Telecommunications Technologies: MPLS L3 VPNs10m
Protect Telecommunications Technologies: SIP10m
Control Network Access: Access Control and Monitoring10m
Control Network Access: Blind Spoofing10m
Control Network Access: Bastion Host10m
Control Network Access: Wired Transmissions10m
Control Network Access: Patch Panels10m
Control Network Access: Remote Meeting Technology10m
Control Network Access: PPTP10m
Control Network Access: SNMP10m
Control Network Access: Virtual Network Terminal Services10m
1 practice exercise
Quiz 230m
Week
3

Week 3

3 hours to complete

Operate and Configure Network-Based Security Devices

3 hours to complete
11 videos (Total 62 min), 11 readings, 1 quiz
11 videos
Network-Based Security Devices: Availability3m
Network-Based Security Devices: Open Mail Relay Servers5m
Network-Based Security Devices: NAT7m
Network-Based Security Devices: Proxies5m
Network-Based Security Devices: FIN, NULL, and XMAS Scanning5m
Network-Based Security Devices: IDS6m
Network-Based Security Devices: IP Fragmentation Attacks and Crafted Packets4m
Network-Based Security Devices: Smurf and Fraggle Attacks6m
Network-Based Security Devices: DoS5m
Network-Based Security Devices: Manipulation of DNS Queries5m
11 readings
Network-Based Security Devices: Network as a Bastion of Defense10m
Network-Based Security Devices: Availability10m
Network-Based Security Devices: Open Mail Relay Servers10m
Network-Based Security Devices: NAT10m
Network-Based Security Devices: Proxies10m
Network-Based Security Devices: FIN, NULL, and XMAS Scanning10m
Network-Based Security Devices: IDS10m
Network-Based Security Devices: IP Fragmentation Attacks and Crafted Packets10m
Network-Based Security Devices: Smurf and Fraggle Attacks10m
Network-Based Security Devices: DoS10m
Network-Based Security Devices: Manipulation of DNS Queries10m
1 practice exercise
Quiz 330m
Week
4

Week 4

3 hours to complete

Manage LAN-Based Security and Implement and Operate Wireless Technologies

3 hours to complete
10 videos (Total 68 min), 10 readings, 1 quiz
10 videos
LAN-Based Security: Segmentation6m
LAN-Based Security: How Does Tagging Work?5m
LAN-Based Security: Common Attacks Against the Data-Link Layer6m
LAN-Based Security: Secure Device Management6m
LAN-Based Security: DNSSEC8m
Implement and Operate Wireless Technologies: Types of Wireless Technologies6m
Implement and Operate Wireless Technologies: TDMA6m
Implement and Operate Wireless Technologies: Infrastructure Mode7m
Implement and Operate Wireless Technologies: Share Key Authentication Flaw6m
10 readings
LAN-Based Security: Separation of Data Plane and Control Plane10m
LAN-Based Security: Segmentation10m
LAN-Based Security: How Does Tagging Work?10m
LAN-Based Security: Common Attacks Against the Data-Link Layer10m
LAN-Based Security: Secure Device Management10m
LAN-Based Security: DNSSEC10m
Implement and Operate Wireless Technologies: Types of Wireless Technologies10m
Implement and Operate Wireless Technologies: TDMA10m
Implement and Operate Wireless Technologies: Infrastructure Mode10m
Implement and Operate Wireless Technologies: Share Key Authentication Flaw10m
1 practice exercise
Quiz 430m

Reviews

TOP REVIEWS FROM NETWORKS AND COMMUNICATIONS SECURITY

View all reviews

About the (ISC)² Systems Security Certified Practitioner (SSCP)

(ISC)² Systems Security Certified Practitioner (SSCP)

Frequently Asked Questions

More questions? Visit the Learner Help Center.