We may earn an affiliate commission when you visit our partners.
Pluralsight logo

Communication and Network Security for CISSP®

Kevin Henry

This course will help you understand the principles of designing secure networks to support organizational goals and requirements and assist you in preparing for the CISSP® examination.

Read more

This course will help you understand the principles of designing secure networks to support organizational goals and requirements and assist you in preparing for the CISSP® examination.

Networks are the foundation for many business processes. In this course, Communication and Network Security for CISSP®, you'll get familiar with secure network management concepts. First, you'll learn about network models and protocols. Next, you'll discover network architecture. Finally, you'll explore network components. By the end of this course, you’ll understand the principles of designing secure networks to support organizational goals and requirements.

Enroll now

What's inside

Syllabus

Course Overview
Secure Networking Models
Secure Network Design
Secure Network Components
Read more
Secure Communications
Domain Summary

Good to know

Know what's good
, what to watch for
, and possible dealbreakers
Delves into secure network management concepts, which are foundational for professionals working with networks
Focuses on concepts and principles rather than specific tools and technologies, ensuring broad applicability and relevance
Led by Kevin Henry, recognized in the field of cybersecurity
Meets part of the CISSP® certification requirements, preparing learners for further accreditation
Possibly requires prior foundational knowledge in networking and security, as it is not explicitly stated as a prerequisite
Adherence to the CISSP® exam format may limit the course's applicability to other cybersecurity certifications

Save this course

Save Communication and Network Security for CISSP® to your list so you can find it easily later:
Save

Activities

Coming soon We're preparing activities for Communication and Network Security for CISSP®. These are activities you can do either before, during, or after a course.

Career center

Learners who complete Communication and Network Security for CISSP® will develop knowledge and skills that may be useful to these careers:
Cybersecurity Engineer
A Cybersecurity Engineer designs, implements, and maintains the hardware and software that protects an organization's network from unauthorized access, use, disclosure, disruption, modification, or destruction. This course, Communication and Network Security for CISSP®, teaches the principles of designing secure networks to support organizational goals and requirements, which may be useful preparation for a role as a Cybersecurity Engineer.
Network Security Engineer
A Network Security Engineer designs, implements, and maintains the hardware and software that protects an organization's network from unauthorized access, use, disclosure, disruption, modification, or destruction. This course, Communication and Network Security for CISSP®, teaches the principles of designing secure networks to support organizational goals and requirements, which may be useful in preparing for a career as a Network Security Engineer.
Security Operations Center (SOC) Analyst
A Security Operations Center (SOC) Analyst is responsible for monitoring an organization's network for suspicious activity and responding to security incidents. This course, Communication and Network Security for CISSP®, teaches the principles of designing secure networks to support organizational goals and requirements, which may be useful in helping a SOC Analyst to identify and respond to security threats.
Risk Analyst
A Risk Analyst is responsible for assessing an organization's information security risks and developing strategies to mitigate those risks. This course, Communication and Network Security for CISSP®, teaches the principles of designing secure networks to support organizational goals and requirements, which may be useful in helping a Risk Analyst to identify and mitigate security risks.
Security Architect
A Security Architect designs and implements security measures to protect an organization's assets, including its networks, systems, and data. This course, Communication and Network Security for CISSP®, may be useful in teaching the principles of secure network architecture.
Penetration Tester
A Penetration Tester is responsible for testing an organization's network for vulnerabilities. This course, Communication and Network Security for CISSP®, teaches the principles of designing secure networks to support organizational goals and requirements, which may be useful in helping a Penetration Tester to identify and exploit vulnerabilities.
Incident Responder
An Incident Responder is responsible for responding to and investigating security incidents. This course, Communication and Network Security for CISSP®, teaches the principles of designing secure networks to support organizational goals and requirements, which may be useful in helping an Incident Responder to identify and respond to security threats.
Information Security Manager
An Information Security Manager is responsible for developing and implementing an organization's information security program. This course, Communication and Network Security for CISSP®, teaches the principles of designing secure networks to support organizational goals and requirements, which may be useful preparation for a role as an Information Security Manager.
Chief Information Security Officer (CISO)
A Chief Information Security Officer (CISO) is responsible for developing and implementing an organization's information security strategy. This course, Communication and Network Security for CISSP®, teaches the principles of designing secure networks to support organizational goals and requirements, which may be useful preparation for a role as a CISO.
Cybersecurity Analyst
A Cybersecurity Analyst is responsible for monitoring and analyzing an organization's network traffic for suspicious activity. This course, Communication and Network Security for CISSP®, may be useful in teaching the principles of secure network design, which can help a Cybersecurity Analyst identify and respond to security threats.
Malware Analyst
A Malware Analyst is responsible for analyzing malware to identify its purpose and how to protect against it. This course, Communication and Network Security for CISSP®, teaches the principles of designing secure networks to support organizational goals and requirements, which may be useful in helping a Malware Analyst to identify and respond to malware threats.
Security Consultant
A Security Consultant provides advice and guidance to organizations on how to protect their networks and data from unauthorized access, use, disclosure, disruption, modification, or destruction. This course, Communication and Network Security for CISSP®, may be useful in providing a foundation in the design of secure networks that are compliant with international and national best practices.
Data Protection Officer (DPO)
A Data Protection Officer (DPO) is responsible for ensuring that an organization complies with data protection laws and regulations. This course, Communication and Network Security for CISSP®, may be useful in providing a foundation in the design of secure networks that are compliant with international and national data protection laws.
IT Auditor
An IT Auditor is responsible for assessing an organization's information security controls to ensure that they are effective and compliant with regulations. This course, Communication and Network Security for CISSP®, may be useful in providing a foundation in the design of secure networks that are compliant with international and national best practices.
Information Security Analyst
An Information Security Analyst is responsible for understanding an organization's information security risk tolerance and for translating that risk tolerance into comprehensive security programs that are grounded in international and national security best practices. This course, Communication and Network Security for CISSP®, may be useful in providing a foundation in the design of secure networks that are compliant with these international and national best practices.

Reading list

We've selected 14 books that we think will supplement your learning. Use these to develop background knowledge, enrich your coursework, and gain a deeper understanding of the topics covered in Communication and Network Security for CISSP®.
Is the official study guide for the CISSP certification exam. It covers all of the topics that are tested on the exam, including communication and network security. This book would be a valuable resource for students who are preparing for the CISSP exam.
Provides a comprehensive overview of communication and network security concepts, including network models, protocols, architecture, and components. It also covers secure communications and domain summary. This book would be a valuable supplement to the course, providing additional depth and breadth to the material covered.
Provides a comprehensive overview of the TCP/IP protocol suite, covering a wide range of topics, including IP addressing, routing, and transport protocols. This book would be a valuable reference tool for students taking the course.
Provides a comprehensive overview of cryptography and network security, covering a wide range of topics, including encryption, decryption, authentication, and access control. This book would be a valuable reference tool for students taking the course.
Provides a comprehensive overview of computer security, covering a wide range of topics, including security threats, risks, and countermeasures. This book would be a valuable supplement to the course, providing additional depth and breadth to the material covered.
Provides a comprehensive overview of network security, covering a wide range of topics, including network security models, threats, and countermeasures. It also includes case studies and real-world examples. This book would be a valuable supplement to the course, providing additional depth and breadth to the material covered.
Provides a hands-on approach to network security, covering a wide range of topics, including network attacks, defenses, and tools. This book would be a valuable resource for students who want to learn more about practical network security.
Provides a comprehensive overview of computer security, covering a wide range of topics, including security threats, risks, and countermeasures. This book would be a valuable supplement to the course, providing additional depth and breadth to the material covered.
Provides a comprehensive overview of computer networking, covering a wide range of topics, including network models, protocols, and architectures. This book would be a valuable supplement to the course, providing additional depth and breadth to the material covered.
Provides a hands-on approach to network security monitoring, covering a wide range of topics, including network traffic analysis, intrusion detection, and incident response. This book would be a valuable resource for students who want to learn more about practical network security monitoring.
Provides a comprehensive overview of hacking techniques, covering a wide range of topics, including buffer overflows, SQL injection, and web application attacks. This book would be a valuable resource for students who want to learn more about ethical hacking and penetration testing.
Provides a comprehensive overview of network security assessment, covering a wide range of topics, including vulnerability scanning, penetration testing, and security auditing. This book would be a valuable resource for students who want to learn more about practical network security assessment.
Provides a comprehensive overview of web application security, covering a wide range of topics, including SQL injection, cross-site scripting, and session hijacking. This book would be a valuable resource for students who want to learn more about ethical hacking and penetration testing.
Provides a unique perspective on network security, focusing on the human element of security. This book would be a valuable resource for students who want to learn more about social engineering and other human-based attacks.

Share

Help others find this course page by sharing it with your friends and followers:

Similar courses

Here are nine courses similar to Communication and Network Security for CISSP®.
Communication and Network Security for CISSP®
Most relevant
Security Architecture and Engineering: Secure Design...
Most relevant
Designing Cisco Wireless Networks: Wired and Wireless...
Most relevant
Software Development Security for CISSP®
Most relevant
Security Architecture and Engineering: Security Controls...
Most relevant
Microsoft Azure Network Engineer: Secure and Monitor...
Most relevant
Identity and Access Management (IAM) for CISSP®
Most relevant
Security and Risk Management: Principles of Risk for...
Asset Security for CISSP®
Our mission

OpenCourser helps millions of learners each year. People visit us to learn workspace skills, ace their exams, and nurture their curiosity.

Our extensive catalog contains over 50,000 courses and twice as many books. Browse by search, by topic, or even by career interests. We'll match you to the right resources quickly.

Find this site helpful? Tell a friend about us.

Affiliate disclosure

We're supported by our community of learners. When you purchase or subscribe to courses and programs or purchase books, we may earn a commission from our partners.

Your purchases help us maintain our catalog and keep our servers humming without ads.

Thank you for supporting OpenCourser.

© 2016 - 2024 OpenCourser