Part 01 - Intro

Video Activity

Welcome to Module 04 of the CISSP course! This module gets to the core of networking and data communications with an introduction to the OSI reference model. The OSI model is the foundation of networking protocols and governs the rules followed by all network devices. The protocols in the reference model are organized into layers and this is what i...

Join over 3 million cybersecurity professionals advancing their career
Sign up with
or

Already have an account? Sign In »

Time
12 hours 41 minutes
Difficulty
Advanced
CEU/CPE
13
Video Description

Welcome to Module 04 of the CISSP course! This module gets to the core of networking and data communications with an introduction to the OSI reference model. The OSI model is the foundation of networking protocols and governs the rules followed by all network devices. The protocols in the reference model are organized into layers and this is what is meant by "layered" protocols. These various layers correspond to the functions supported by network devices such as hubs, switches, routers, VLANs, and as it names implies, Layer-3 switches. We'll also have a look at wireless communications and the threats targeted against it. The various encryption protocols used in wireless communications will be discussed within this security context and these include WEP, WPA, and WPA-2. And don't think you can safely ignore WEP simply because it's outdated! Many devices that utilize it are still widely deployed. There's quite a bit of meat in this module and as such, is a very testable subject area on the CISSP exam!

Video Transcription
00:04
book at the outline. What we're gonna cover is very comparable to what you would expect. We're going to talk about the beloved O S I reference model
00:14
in just about any class you cake that's gonna cover networking. Security is gonna talk about that, Wes I model. And I think it's a very important model because it helps us understand. Um,
00:24
the various things that happened in networking we'll go into that now. By the time we've covered the Westside reference model,
00:32
we will have talked about various network protocols and network protocols really governed the rules of communication and various protocols have varying rules for communication. And the bottom line is we, of course, have to be using the same rules if we're gonna communicate successfully.
00:48
Ah, we will also have talked about network communication devices,
00:52
huh? Switch router, villain. Layer three switch because again, you know, when you're having this discussion on the S I model, it's really hard for me to tell you a routers, layer three without telling me what a router does. So, honestly, by the time we get through the s I model, we will have covered a lot
01:11
of the work That's in this chapter.
01:11
Also, firewalls will talk about that in the conclusion of the S on model because I think firewalls are a really good way to see the significance of O s. I. And then the final section that will cover is gonna be on wireless communications. I think you're gonna see a lot of questions there specifically
01:29
threats, wireless communications and the difference between the security mechanisms of weap
01:34
w p A and W p A to. And yes, they are very much still asking questions on wept. And if you think Weps weapons obsolete, you are wrong. Many companies still use wept. Ah, a lot of Internet service providers.
01:52
If you'll take a look at your router, you're gonna find a Web key on them. So wet
01:56
is not
01:59
Excuse me is not obsolete
02:00
should be, but it isn't so. We'll talk about the differences between those three mechanisms. Like I said, that's a very testable chapter. So take some good notes, rely on the experience you have with telecommunications in network security
Up Next
ISC2 CISSP

Our free online CISSP (8 domains) training covers topics ranging from operations security, telecommunications, network and internet security, access control systems and methodology and business continuity planning.

Instructed By