Acerca de este Curso
9,503 vistas recientes

100 % en línea

Comienza de inmediato y aprende a tu propio ritmo.

Fechas límite flexibles

Restablece las fechas límite en función de tus horarios.

Nivel principiante

Aprox. 14 horas para completar

Sugerido: 5 hours/week...

Inglés (English)

Subtítulos: Inglés (English)
User
Los estudiantes que toman este Course son
  • Security Engineers
  • Customer Care Reps
  • IT Support
  • Technical Support Associates
  • Engineers
User
Los estudiantes que toman este Course son
  • Security Engineers
  • Customer Care Reps
  • IT Support
  • Technical Support Associates
  • Engineers

100 % en línea

Comienza de inmediato y aprende a tu propio ritmo.

Fechas límite flexibles

Restablece las fechas límite en función de tus horarios.

Nivel principiante

Aprox. 14 horas para completar

Sugerido: 5 hours/week...

Inglés (English)

Subtítulos: Inglés (English)

Programa - Qué aprenderás en este curso

Semana
1
7 horas para completar

Understand Security Issues Related to Networks

26 videos (Total 168 minutos), 23 lecturas, 1 cuestionario
26 videos
Understand Security Issues: OSI Model (Layers 4, 5, 6, and 7)4m
Understand Security Issues: OSI Model (Layers 1,2, and 3)4m
Understand Security Issues: OSI Model7m
Understand Security Issues: Layers Review4m
Understand Security Issues: Layers Review7m
Understand Security Issues: IP Networking5m
Understand Security Issues: Network Classes11m
Understand Security Issues: IPv65m
Understand Security Issues: DHCP3m
Understand Security Issues: DHCP6m
Understand Security Issues: ICMP6m
Understand Security Issues: Ping Scanning6m
Understand Security Issues: RPC5m
Understand Security Issues: Ring7m
Understand Security Issues: Unicast, Multicast, and Broadcast Transmissions6m
Understand Security Issues: Packet-Switched Networks4m
Understand Security Issues: CSMA8m
Understand Security Issues: FDDI5m
Understand Security Issues: DNS5m
Understand Security Issues: DNS12m
Understand Security Issues: DNS Quick Reference6m
Understand Security Issues: FTP4m
Understand Security Issues: Proxies7m
Understand Security Issues: HTTP Tunneling5m
Understand Security Issues: SCADA Attacks6m
23 lecturas
Networks and Communications Security10m
Understand Security Issues: OSI Model (Layers 4, 5, 6, and 7)10m
Understand Security Issues: OSI Model (Layers 1,2, and 3)10m
Understand Security Issues: Layers Review10m
Understand Security Issues: Layers Review10m
Understand Security Issues: IP Networking10m
Understand Security Issues: Network Classes10m
Understand Security Issues: IPv610m
Understand Security Issues: DHCP10m
Understand Security Issues: DHCP10m
Understand Security Issues: ICMP10m
Understand Security Issues: Ping Scanning10m
Understand Security Issues: RPC10m
Understand Security Issues: Ring10m
Understand Security Issues: Unicast, Multicast, and Broadcast Transmissions10m
Understand Security Issues: Packet-Switched Networks10m
Understand Security Issues: CSMA10m
Understand Security Issues: FDDI10m
Understand Security Issues: DNS Quick Reference10m
Understand Security Issues: FTP10m
Understand Security Issues: Proxies10m
Understand Security Issues: HTTP Tunneling10m
Understand Security Issues: SCADA Attacks10m
1 ejercicio de práctica
Quiz 120m
Semana
2
4 horas para completar

Protect Telecommunications Technologies and Control Network Access

13 videos (Total 88 minutos), 13 lecturas, 1 cuestionario
13 videos
Protect Telecommunications Technologies: MPLS7m
Protect Telecommunications Technologies: MPLS L3 VPNs6m
Protect Telecommunications Technologies: SIP14m
Control Network Access: Access Control and Monitoring7m
Control Network Access: Blind Spoofing5m
Control Network Access: Bastion Host5m
Control Network Access: Wired Transmissions6m
Control Network Access: Patch Panels5m
Control Network Access: Remote Meeting Technology6m
Control Network Access: PPTP5m
Control Network Access: SNMP4m
Control Network Access: Virtual Network Terminal Services6m
13 lecturas
Protect Telecommunications Technologies: IP Convergence10m
Protect Telecommunications Technologies: MPLS10m
Protect Telecommunications Technologies: MPLS L3 VPNs10m
Protect Telecommunications Technologies: SIP10m
Control Network Access: Access Control and Monitoring10m
Control Network Access: Blind Spoofing10m
Control Network Access: Bastion Host10m
Control Network Access: Wired Transmissions10m
Control Network Access: Patch Panels10m
Control Network Access: Remote Meeting Technology10m
Control Network Access: PPTP10m
Control Network Access: SNMP10m
Control Network Access: Virtual Network Terminal Services10m
1 ejercicio de práctica
Quiz 220m
Semana
3
3 horas para completar

Operate and Configure Network-Based Security Devices

11 videos (Total 62 minutos), 11 lecturas, 1 cuestionario
11 videos
Network-Based Security Devices: Availability3m
Network-Based Security Devices: Open Mail Relay Servers5m
Network-Based Security Devices: NAT7m
Network-Based Security Devices: Proxies5m
Network-Based Security Devices: FIN, NULL, and XMAS Scanning5m
Network-Based Security Devices: IDS6m
Network-Based Security Devices: IP Fragmentation Attacks and Crafted Packets4m
Network-Based Security Devices: Smurf and Fraggle Attacks6m
Network-Based Security Devices: DoS5m
Network-Based Security Devices: Manipulation of DNS Queries5m
11 lecturas
Network-Based Security Devices: Network as a Bastion of Defense10m
Network-Based Security Devices: Availability10m
Network-Based Security Devices: Open Mail Relay Servers10m
Network-Based Security Devices: NAT10m
Network-Based Security Devices: Proxies10m
Network-Based Security Devices: FIN, NULL, and XMAS Scanning10m
Network-Based Security Devices: IDS10m
Network-Based Security Devices: IP Fragmentation Attacks and Crafted Packets10m
Network-Based Security Devices: Smurf and Fraggle Attacks10m
Network-Based Security Devices: DoS10m
Network-Based Security Devices: Manipulation of DNS Queries10m
1 ejercicio de práctica
Quiz 312m
Semana
4
3 horas para completar

Manage LAN-Based Security and Implement and Operate Wireless Technologies

10 videos (Total 68 minutos), 10 lecturas, 1 cuestionario
10 videos
LAN-Based Security: Segmentation6m
LAN-Based Security: How Does Tagging Work?5m
LAN-Based Security: Common Attacks Against the Data-Link Layer6m
LAN-Based Security: Secure Device Management6m
LAN-Based Security: DNSSEC8m
Implement and Operate Wireless Technologies: Types of Wireless Technologies6m
Implement and Operate Wireless Technologies: TDMA6m
Implement and Operate Wireless Technologies: Infrastructure Mode7m
Implement and Operate Wireless Technologies: Share Key Authentication Flaw6m
10 lecturas
LAN-Based Security: Separation of Data Plane and Control Plane10m
LAN-Based Security: Segmentation10m
LAN-Based Security: How Does Tagging Work?10m
LAN-Based Security: Common Attacks Against the Data-Link Layer10m
LAN-Based Security: Secure Device Management10m
LAN-Based Security: DNSSEC10m
Implement and Operate Wireless Technologies: Types of Wireless Technologies10m
Implement and Operate Wireless Technologies: TDMA10m
Implement and Operate Wireless Technologies: Infrastructure Mode10m
Implement and Operate Wireless Technologies: Share Key Authentication Flaw10m
1 ejercicio de práctica
Quiz 416m
4.7
12 revisionesChevron Right

Principales revisiones sobre Networks and Communications Security

por GBJul 3rd 2018

Great course. The instructor was clearly a subject matter expert who broke it down so it was easy to understand. Thank you.

por RDMar 22nd 2019

It was really a good and beneficial course. I literally have learned many new things.

Instructor

Avatar

(ISC)² Education & Training

Education & Training

Acerca de (ISC)²

(ISC)² is an international nonprofit membership association focused on inspiring a safe and secure cyber world. Best known for the acclaimed Certified Information Systems Security Professional (CISSP®) certification, (ISC)2 offers a portfolio of credentials that are part of a holistic, programmatic approach to security. www.isc2.org ...

Acerca de (ISC)² Systems Security Certified Practitioner (SSCP)

Pursue better IT security job opportunities and prove knowledge with confidence. The SSCP Professional Training Certificate shows employers you have the IT security foundation to defend against cyber attacks – and puts you on a clear path to earning SSCP certification. Learn on your own schedule with 120-day access to content aligned with the latest (ISC)2 SSCP exam domains. We’re offering the complete online self-paced program for only $1,000 – a $200 savings when you get all domains bundled together. 3 Steps to Career Advancement 1. Register for the course 2. Gain access for 120 days 3. Register and sit for the SSCP certification exam Upon completing the SSCP Professional Certificate, you will: 1. Complete six courses of preparing you to sit for the Systems Security Certified Practitioner (SSCP) certification exam as outlined below. Course 1 - Access Controls Course 2 - Security Operations and Administration Course 3 - Risk Identification, Monitoring, and Analysis/Incident Response and Recovery Course 4 - Cryptography Course 5 - Network and Communication Security Course 6 - Systems and Application Security 2. Receive a certificate of program completion. 3. Understand how to implement, monitor and administer an organization’s IT infrastructure in accordance with security policies and procedures that ensure data confidentiality, integrity and availability....
(ISC)² Systems Security Certified Practitioner (SSCP)

Preguntas Frecuentes

  • Sí, puedes acceder a una vista preliminar del primer video y ver el programa antes de inscribirte. Debes comprar el curso para acceder a contenido que no está incluido en la vista preliminar

  • Si decides inscribirte en el curso antes de la fecha de inicio de la sesión, tendrás acceso a todos los videos y las lecturas de la lección para el curso. Podrás enviar tareas en cuanto comience la sesión.

  • Una vez que te inscribes y comienza la sesión, tendrás acceso a todos los videos y otros recursos, incluidos artículos de lectura y el foro de debate del curso. Podrás ver y enviar tareas de práctica y completar tareas con calificación obligatorias para obtener un título y un Certificado de curso

  • Si completas el curso de manera correcta, tu Certificado de curso electrónico se agregará a la página Logros. Desde allí, puedes imprimir tu Certificado de curso o agregarlo a tu perfil de LinkedIn

  • Este curso es uno de los pocos que se ofrecen en Coursera que está actualmente disponible solo para estudiantes que pagaron o que recibieron ayuda económica, si está disponible.

  • The course schedule contains approximately 15 hours of content material covering lectures, reading materials, a case study, and quizzes broken up over the course of 7 weeks.

¿Tienes más preguntas? Visita el Centro de Ayuda al Alumno.