Certified Information Systems Security Professional, Part 5 of 9: Network Protocols and Wireless

with expert Kevin Henry

This course will discuss protocols and structures of communications transmitted across networks. OSI hierarchy and the devices that manage communications and how to protect them. It will end with ports, services and switches and how they must be secured and network based attacks to be prepared for. This course is part of a series covering the ISC(2) Certified Information Systems Security Professional (CISSP).


Beginner | 2h 45m | March 22, 2018

Security

Course Outline


Kevin Henry

Kevin is an international author, consultant and international <br />speaker. He is the official course development writer for ISC2 CISSP, ISACA CRISC and mile2&rsquo;s C)ISSO. Kevin has been educating IT professionals for over 30 years. He also provides cyber security consulting and support services for organizations around the world. Assisting them with setting up Information Security programs and addressing areas ranging from in-depth risk analysis to policy creation and security awareness.




Explore Our Blogs, Courses and Webinars