O'Reilly logo

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

CISSP Video Course Domain 7 – Telecommunications and Networking

Video Description

The fast, powerful way to prepare for your CISSP exam!

30+ hours of personal video training from leading security expert Shon Harris

Achieving the (ISC)2’s globally recognized CISSP can give your IT career a lift. In this DVD, the world’s #1 CISSP trainer brings her legendary five-day boot camp to your computer screen. Packed with over 30 hours of instruction adapted from Shon’s classes, this video course includes realistic labs, scenarios, case studies, and animations designed to build and test your knowledge in real-word settings. Preparing for the CISSP has never been this easy or convenient.

Master the skills and concepts you need for all ten CISSP common body of knowledge domains:

  • Access Control

  • Application Security

  • Business Continuity and Disaster Recovery Planning

  • Cryptography

  • Information Security and Risk Management

  • Legal, Regulations, Compliance, and Investigations

  • Operations Security

  • Physical (Environmental) Security

  • Security Architecture and Design

  • Telecommunications and Network Security

  • System Requirements

    OPERATING SYSTEM: Windows 2000, XP, or Vista; Mac OS X 10.4 (Tiger) or later
    MULTIMEDIA: DVD drive; 1024 x 768 or higher display; sound card with speakers
    COMPUTER: 500MHz or higher CPU; 128MB RAM or more

    Table of Contents

    1. Course Introduction 00:07:24
    2. Domain 7 – Telecommunications and Networking 00:00:48
    3. OSI Model 00:03:09
    4. Networking Communications 00:04:22
    5. Application Layer 00:02:33
    6. Presentation Layer 00:02:37
    7. OSI – Session Layer 00:03:12
    8. Transport Layer 00:03:00
    9. Network Layer 00:02:46
    10. Data Link Layer 00:05:52
    11. Physical Layer 00:01:33
    12. Layers Working Together 00:10:43
    13. Network Topologies 00:06:32
    14. LAN Media Access Technologies 00:02:45
    15. Media Access Technologies 00:13:02
    16. Cabling Types-Coaxial 00:01:39
    17. Cabling Types – Twisted Pair 00:01:51
    18. Types of Cabling – Fiber 00:01:47
    19. Signal and Cable Issues 00:01:56
    20. Transmission Types 00:11:52
    21. Network Technologies 00:03:48
    22. Networking Devices 00:06:20
    23. Virtual LANs 00:04:31
    24. Sniffers 00:03:13
    25. Networking Devices – Router 00:02:15
    26. Hops 00:00:56
    27. Routers 00:00:49
    28. Bridges Compared to Routers 00:01:29
    29. Port and Protocol Relationship 00:05:24
    30. TCP/IP Suite 00:01:09
    31. UDP versus TCP 00:02:29
    32. TCP Segment 00:00:50
    33. SYN Flood 00:03:29
    34. Teardrop Attack 00:02:05
    35. Source Routing 00:01:03
    36. Source Routing Types 00:00:52
    37. IP Address Ranges 00:02:56
    38. IPv6 00:02:25
    39. Protocols 00:00:11
    40. Protocols – ARP 00:01:09
    41. IP to MAC Mapping 00:00:50
    42. How ARP Works 00:01:27
    43. ARP Poisoning 00:01:13
    44. ICMP Packets 00:01:22
    45. A Way Hackers Use ICMP 00:01:19
    46. Ping Steps 00:01:30
    47. Protocols – SNMP 00:00:49
    48. SNMP In Action 00:03:20
    49. SNMP 00:01:48
    50. SNMP Output 00:00:58
    51. POP3 and SMTP 00:01:20
    52. Mail Relay 00:02:00
    53. Protocols – FTP, TFTP, Telnet 00:02:36
    54. Protocols – RARP and BootP 00:01:18
    55. DHCP – Dynamic Host Configuration Protocol 00:01:04
    56. Networking Device – Bastion Host 00:04:01
    57. Network Devices – Firewalls 00:06:37
    58. Rule Set Example 00:01:22
    59. Firewall Types – Proxy Firewalls 00:01:50
    60. Firewall Types – Circuit-Level Proxy Firewall 00:01:48
    61. Circuit-Level Proxy 00:05:44
    62. Dedicated Proxy Servers 00:21:54
    63. Dial-Up Protocols and Authentication Protocols 00:04:55
    64. Authentication Protocols 00:08:07
    65. Virtual Private Network Technologies 00:19:32
    66. SDLC and HDLC 00:04:42
    67. Quality of Service (QoS) 00:02:37
    68. Autonomous Systems 00:02:04
    69. Routing Protocols 00:10:53
    70. Routing Protocol Attacks 00:17:26
    71. Network Service – NAT 00:06:32
    72. WAN Technologies Are Circuit or Packet Switched 00:01:10
    73. PSTN 00:02:24
    74. Multiplexing 00:01:40
    75. Types of Multiplexing 00:04:02
    76. Packet Switching 00:03:52
    77. WAN Technologies – Packet Switched 00:00:17
    78. WAN Technologies – X.25 00:00:54
    79. X.25 00:01:09
    80. WAN Technologies – Frame Relay 00:01:47
    81. WAN Example 00:00:44
    82. Frame Relay 00:02:26
    83. WAN Technologies – ATM 00:01:21
    84. Cell Switching 00:00:46
    85. Wide Area Network Technologies 00:05:50
    86. WAN Technologies – Cable Modem 00:01:37
    87. Cable Modems and Satellites 00:03:38
    88. Network Perimeter Security 00:01:03
    89. Complexity Only Increases 00:01:04
    90. Agenda 9 00:01:21
    91. PSTN (Cont.) 00:01:54
    92. Private Branch Exchange 00:01:50
    93. PBX Vulnerabilities 00:01:33
    94. PBX Best Practices 00:01:44
    95. IP Telephony 00:14:39
    96. Mobile Phone Security 00:01:23
    97. Mobile Device Security 00:01:22
    98. Cell Phone 00:02:40
    99. Wireless Technologies 00:15:20
    100. OFDM 00:02:52
    101. 802.11n 00:01:09
    102. Wireless Technologies – Access Point (Cont.) 00:01:01
    103. Architectures 00:00:46
    104. Wireless Technologies – Service Set ID 00:01:46
    105. Authenticating to an AP 00:01:03
    106. 802.11 Authentication 00:02:27
    107. Wireless Technologies – WEP Woes 00:07:43
    108. 802.11 Security Solutions 00:10:40
    109. Types of 802.11 Security 00:03:30
    110. Wireless EAP 00:23:20
    111. Wireless Technologies – WAP and WTLS 00:03:52
    112. Instant Messaging 00:03:02
    113. Domain 7 Review 00:01:40