CISSP-Course

Home/Tag:CISSP-Course

Secure Network Components

2020-07-16T07:11:17+00:00Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , |

Secure Network Components Network equipment must be securely operated and maintained. In this part of this tutorial, we'll take a look at secure networks to help you understand the different aspects of secure network components. You as a CISSP candidate need to understand security fundamentals and concepts specifically related to different types of network [...]

Wireless Networks Security

2020-07-16T07:20:44+00:00Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , |

Wireless Networks Security IEEE proposed the 802.11 standards for wireless communications. Various versions have been developed in wireless networking hardware: WLAN Security Techniques and Protocols Security techniques and protocols for wireless communication include: Service Set Identifier (SSID): It is a name that identifies a wireless network. Each wireless network must have a SSID. [...]

Implications of Multilayer Protocols

2020-07-16T07:04:43+00:00Tags: , , , , , , , , , , , , , , , |

Implications of Multilayer Protocols TCP/IP consists of dozens of individual protocols spread across various protocol stack layers, and in fact, is a multilayer protocol. This feature gives TCP/IP significant advantages: Benefits of Multilayer Protocols: Encryption can be integrated at various layers. A wide range of protocols can be used at higher layers. Supports flexibility [...]

TCP/IP Model

2020-07-16T07:19:01+00:00Tags: , , , , , , , , , , , |

TCP/IP Model In this part of this tutorial, we'll take a look at TCP-IP model to help you understand the different aspects of requirements for TCP-IP model.  The Transmission Control Protocol/Internet Protocol (TCP/IP) Model is similar to the OSI Reference Model but consists of only four layers: Application Transport Internet Link The designers of [...]

OSI Model

2020-07-16T07:07:21+00:00Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , |

OSI Model One of the most important topics in all networking courses is OSI model. Communication between computers over public or private networks is made possible by using different protocols. A protocol is a set of rules and limitations that define how data is transmitted over a medium such as a wired medium or [...]

Communication & Network Security Domain

2020-07-16T08:04:07+00:00Tags: , , , , , , , , , , , |

Communication & Network Security Domain The Communication and Network Security domain deals with topics related to network components such as network models, network devices and protocols; specifically, how they function and how they are relevant to security. This domain discusses the OSI model as a guiding principle in networking, cabling, wireless connectivity, TCP/IP and [...]

Site & Facility Design Principles & Security Controls- Part 2

2020-07-15T14:03:23+00:00Tags: , , , , , , , , , , , , , , , , , , , , , , , , |

Site & Facility Design Principles & Security Controls- Part 2 Utilities and Heating, Ventilation, and Air Conditioning (HVAC) We come to the part where we talk about physical site & facility controls. The heating and air-conditioning systems are necessary for maintaining a safe and acceptable operating environment for computers and personnel. Computing equipment and [...]

Site & Facility Design Principles & Security Controls- Part 1

2020-07-15T14:00:35+00:00Tags: , , , , , , , , , , , , , , , , , , , , , , , , |

Site & Facility Design Principles & Security Controls- Part 1 One of the most important topics in CISSP course is physical site & facility controls. Some of the principles are provided by Crime Prevention through Environmental Design (CPTED) which are widely adopted all over the world by the security professionals to design public and [...]

Cryptography- Part 4

2020-07-15T13:40:33+00:00Tags: , , , , , , , , , , , |

Cryptography- Part 4 Hashing Hash functions are primarily used to provide integrity. Hashing and cryptography have a very close relationship. A one-way function ensures that the same key can’t encrypt and decrypt a message in an asymmetric key system. A one-way function’s purpose is to ensure confidentiality. A one-way hashing algorithm produces a hashing [...]

Go to Top