ISSAP – Communications & Network Security

Voice & Facsimile Communications

  • Pulse Code Modulation (PCM)
  • Circuit-Switched / Packet-Switched Networks
  • VoIP Architecture Concerns
  • End-to-End Delay
  • Jitter
  • Method of Voice Digitization Used
  • Packet Loss Rate
  • Security
  • Voice Security Policies and Procedures
  • Encryption
  • Authentication
  • Administrative Change Control
  • Integrity
  • Availability
  • Voice Protocols

Network Architecture

  • Redundancy and Availability
  • Internet Versus Intranet
  • Extranet
  • Network Types
  • Perimeter Controls
  • Security Modens
  • Communications and Network Polices
  • Overview of Rirewalls
  • Firewalls vs. Routers
  • DMZ
  • IDS/IPS
  • IDS Architecture
  • IPS
  • SIEM
  • Wireless Consdierations
  • Architectures
  • Security Issues
  • WPA
  • WPA2
  • IEEE 802.11i and 802.1x
  • 802.1x
  • Zones of control
  • Network Security
  • Content Filtering
  • Anti-malware
  • anti-spam
  • Outbound traffic filtering
  • Mobile code
  • olicy Enforcement Design
  • Application and Transport Layer Security
  • Social Media
  • Secure E-Commerce Protocols
  • SSL/TLS and TCP/IP
  • Encryption
  • Authenticatgion
  • Certificates and Certificate Autheorities
  • Data Integrity
  • SSL-/TLS
  • Limitations of SSL/TLS
  • Other Security Protocols
  • Secure Remote Procedure Calls
  • Network Layer Security and VPNs
  • Types of VPN Tunneling
  • VPN Tunneling Protocols
  • L2TP
  • IPSEC
  • AH
  • ESP
  • Cryptography Algorithms
  • L2TP/IPSec
  • Authentication using EAP
  • TCP Wrapper
  • SOCKS
  • Comparing SOCKS with HTTP Proxies
  • VPN Selection
  • Topology Supported
  • Authentication supported
  • Encryption Supported
  • Scalability
  • Management
  • VPN Client Software
  • Operating System and Browser Support
  • Performance
  • Endpoint Security
  • Encryption

Network Security Design Considerations

  • Inter-operability and Associated Risks
    • Cross-Domain Risks and Solutions
  • Audits & Assessments
    • Monitoring
  • Operating Environment
    • Remote Access
    • Monitoring
    • Design Validation
    • Penetration Testing
    • Vulnerability Assessment
    • Monitoring and Network Attacks
    • Risk-Based Architecture
  • Secure Sourcing Strategy

Leave Comment

Your email address will not be published. Required fields are marked *

UA-46837009-1