Video description
Networking and Telecom
Shon Harris
The fast, powerful way to prepare for your SSCP exam!
Get all the hands-on training you need to pass (ISC)²’s tough
SSCP exam, get certified, and move forward in your IT security
career! In this online video, the world’s #1 information security
trainer walks you through every skill and concept you’ll need to
master. This online video contains almost seven hours of training
adapted from Shon Harris’s legendary five-day SSCP boot
camps–including realistic labs, scenarios, case studies, and
animations designed to build and test your knowledge in real-world
settings!
Comprehensive coverage of SSCP domains of knowledge:
. Data
Encapsulation
. Cabling
Types
. Network
Technologies
. Network
Configurations
. Firewall
Types
. WAN
Technologies
About the Shon Harris Security Series
This online video is part of a complete library of books,
online services, and videos designed to help security professionals
enhance their skills and prepare for their certification exams.
Every product in this series reflects Shon Harris’s unsurpassed
experience in teaching IT security professionals.
Category: Security
System Requirements
OPERATING SYSTEM: Windows 2000, XP, or Vista; Mac OS X 10.4
(Tiger) or later
MULTIMEDIA: DVD drive; 1024 x 768 or higher display; sound card
with speakers
COMPUTER: 500MHz or higher CPU; 128MB RAM or more
Table of Contents
Course Introduction
00:17:17
Domain 6 - Networking and Telecom
00:00:38
Agenda 1
00:00:31
OSI Model
00:01:39
OSI Layers
00:00:59
Networking Communications
00:00:40
An Older Model
00:01:40
Data Encapsulation
00:02:02
Application Layer
00:02:33
Presentation Layer
00:01:21
OSI - Presentation Layer
00:01:16
OSI - Session Layer
00:01:00
Client/Server Model
00:00:56
Client/Server Session Layer
00:01:15
Transport Layer
00:03:00
OSI - Network Layer
00:00:56
Here to There
00:01:06
Network Layer
00:00:44
OSI - Data Link
00:01:49
Data Link
00:02:05
Sublayers
00:01:58
OSI - Physical Layer
00:00:20
Physical Layer
00:01:13
Layers Working Together
00:00:29
Protocols at Each Layer
00:05:53
Devices Work at Different Layers
00:02:17
Types of Networks
00:01:27
Network Topologies - Physical Layer
00:00:37
Topology Type - Bus
00:00:52
Topology Type - Ring
00:01:46
Topology Type - Star
00:00:55
Network Topologies - Mesh
00:01:49
Summary of Topologies
00:01:11
Agenda 2
00:01:10
Media Access
00:00:53
One Goal of Media Access Technologies
00:00:42
Collision Domain
00:00:58
Back Off, Buddy
00:01:30
Carrier Sense Multiple Access
00:01:11
CSMA/Collision Avoidance (CSMA/CA)
00:01:24
Media Access Technologies - Ethernet
00:02:09
Media Access Technologies - Token Passing
00:02:55
Token’s Role
00:00:46
Other Technologies
00:01:07
Media Access Technologies - Polling
00:01:02
Agenda 3
00:01:39
Cabling Types - Twisted Pair
00:01:29
Cable Types
00:00:56
Multimode versus Single Mode
00:01:12
Signal and Cable Issues
00:00:52
Signaling Issues
00:01:04
Transmission Types - Analog and Digital
00:01:53
Transmission Types - Synchronous
00:00:57
Asynchronous
00:00:42
Transmission Types
00:02:08
Cabling Issues - Plenum-Rated
00:01:57
Transmission Types - Number of Receivers
00:02:30
Internet Group Management Protocol
00:00:54
Multicasting
00:00:52
Network Technologies
00:01:14
Extranet
00:00:42
Network Technologies (Cont.)
00:01:14
EDI Evolution
00:00:38
Networking Devices
00:04:04
Forwarding Table Example
00:01:21
Network Devices - Switch
00:00:55
Virtual LAN
00:01:24
VLAN
00:00:53
Interfaces and VLANs
00:02:14
Sniffers
00:03:13
Networking Devices - Router
00:02:14
Hops
00:00:56
Routers
00:00:49
Bridges Compared to Routers
00:01:29
Network Devices - Gateway
00:00:54
Agenda 4
00:02:09
Client Ports
00:01:34
Conceptual Use of Ports
00:00:47
TCP/IP Suite
00:01:09
UDP versus TCP
00:02:29
TCP Segment
00:00:50
SYN Flood
00:03:29
Teardrop Attack
00:02:05
Source Routing
00:01:03
Source Routing Types
00:00:52
IP Address Ranges
00:02:56
IPv6
00:02:35
Protocols - ARP
00:01:09
IP to MAC Mapping
00:00:50
How ARP Works
00:01:27
ARP Poisoning
00:01:13
ICMP Packets
00:01:22
A Way Hackers Use ICMP
00:01:19
Ping Steps
00:01:30
Protocols - SNMP
00:00:49
SNMP in Action
00:03:20
SNMP
00:01:48
SNMP Output
00:00:58
POP3 and SMTP
00:00:47
Protocols - SMTP
00:02:33
Protocols - FTP, TFTP, Telnet
00:02:36
Protocols - RARP and BootP
00:01:18
DHCP - Dynamic Host Configuration Protocol
00:01:04
Agenda 5
00:01:49
Network Configurations
00:01:07
DMZ Configurations
00:01:05
Firewall Comparisons
00:00:44
Network Devices - Firewalls
00:02:25
Packet Filtering Firewall
00:01:56
Packet Filtering Firewall Weaknesses
00:00:57
Packet Filtering
00:00:35
Rule Set Example
00:01:22
Firewall Types
00:07:37
Application-Layer Proxy Advantages
00:00:44
Application-Layer Proxy Disadvantages
00:01:01
Dedicated Proxy Servers
00:00:57
Firewall Types - Stateful
00:04:42
State Table
00:03:58
Firewall Types - Kernel Proxies
00:01:31
Firewall Based VPN Devices
00:00:51
Best Practices
00:02:58
Firewall Placement
00:01:18
Packet Filtering (Cont.)
00:00:36
Screened Host
00:01:14
Firewall Architecture Types - Multi- or Dual-Homed
00:01:24
Screened Subnet
00:02:25
Agenda 6
00:00:47
Dial-Up Protocol - SLIP
00:00:46
Dial-Up Protocol - PPP
00:01:01
PPP
00:00:51
PPP versus SLIP
00:01:31
Authentication Protocols - PAP
00:00:45
Authentication Protocols - CHAP
00:02:15
Authentication Protocol - EAP
00:01:24
Data Inspection
00:03:44
Virtual Private Network Technologies
00:01:18
Analogy
00:01:01
Tunneling Protocols - Examples
00:00:58
Tunneling Protocols - PPTP
00:01:08
Tunneling Protocols - L2TP
00:02:35
L2TP Encapsulation
00:00:30
Tunneling Protocols - IPSec
00:00:48
IPSec Basic Features
00:03:55
IPSec Modes
00:00:35
Security Associations (SAs)
00:04:01
Combining Sas
00:02:14
Iterated Tunnelling
00:00:28
Agenda 7
00:01:20
Layer 3 at Layer 2
00:00:59
MPLS
00:01:09
Multiprotocol Label Switching
00:01:13
Quality of Service (QoS)
00:01:48
QoS Services
00:00:49
Autonomous Systems
00:02:04
Routing Protocols
00:02:16
Routing
00:01:51
Routing Protocols (Cont.)
00:02:04
OSPF
00:01:22
IGRP
00:00:40
BGP
00:02:39
Routing Protocol Attacks
00:00:54
MAN Technologies
00:04:03
Connecting Networks
00:01:30
Network Services
00:02:47
Name Resolving Steps
00:03:32
Split DNS
00:01:02
Host Name Resolution Attacks
00:03:37
Network Service - NAT
00:04:26
NIS
00:00:43
Storing Data
00:00:45
NIS+ Authentication
00:00:38
Agenda 8
00:01:10
PSTN
00:00:58
Circuit Switching
00:00:41
Steps of Connections
00:00:45
Multiplexing
00:01:40
Types of Multiplexing
00:00:53
TDM Process
00:01:44
FDM
00:01:25
Packet Switching
00:02:28
Circuit versus Packet Switching
00:01:24
WAN Technologies - Packet Switched
00:00:17
WAN Technologies - X.25
00:00:54
X.25
00:01:09
WAN Technologies - Frame Relay
00:01:47
WAN Example
00:00:44
Frame Relay
00:05:34
WAN Technologies - ISDN
00:02:10
WAN Technologies - DSL
00:02:38
WAN Technologies - Cable Modem
00:01:37
Cable Modems
00:00:54
Cable Network
00:00:32
Satellites
00:00:39
Hybrid Connection
00:00:52
Satellite Coverage
00:00:40
Network Perimeter Security
00:01:03
Complexity Only Increases
00:01:04
A Layered Approach
00:00:37
Agenda 9
00:00:44
PSTN (Cont.)
00:01:54
Private Branch Exchange
00:01:50
PBX Vulnerabilities
00:01:33
PBX Best Practices
00:01:44
Voice Over IP
00:03:36
Media Gateways
00:00:32
PBX and VoIP
00:00:52
Voice over
00:00:27
IP Telephony Issues
00:01:15
Telephony Protection Mechanisms
00:00:36
Telephony Security
00:02:39
IP Telephony with Wireless
00:00:32
IP Phones Security
00:02:13
Mobile Technology Generations
00:01:55
Mobile Phone Security
00:01:23
Mobile Device Security
00:01:22
Cell Phone
00:02:40
Agenda 10
00:02:18
Wireless Frequencies
00:01:10
Alphabet Soup of Standards
00:06:01
Spread Spectrum
00:05:50
OFDM
00:00:42
Where Does Spread Spectrum Work?
00:02:10
802.11n
00:01:09
Wireless Technologies - Access Point (Cont.)
00:01:01
Architectures
00:00:46
Wireless Technologies - Service Set ID
00:01:46
Authenticating to an AP
00:01:03
802.11 Authentication
00:02:27
Wireless Technologies - WEP
00:01:58
Wireless Technologies - More WEP Woes
00:02:41
Lack of Integrity
00:00:33
WEP Security Issues
00:01:11
Frequency Management
00:01:19
802.11 Security Solutions
00:04:12
802.1x
00:01:20
802.1x Authentication
00:05:08
Types of 802.11 Security
00:01:22
IEEE 802.11i Standard
00:02:07
Wireless EAP
00:05:50
Wireless Technologies - Common Attacks
00:07:29
Wireless Reconnaissance Output
00:00:34
Warchalking
00:01:33
Countermeasures
00:04:56
Wireless Attacks
00:02:10
Wormhole Attack
00:00:48
Wireless Technologies - WAP
00:00:44
Wireless Technologies - WTLS
00:01:31
i-mode
00:00:36
Bluetooth
00:01:01
Instant Messaging
00:03:02
Domain 6 Review
00:01:22