Time
1 hour 53 minutes
Difficulty
Beginner
CEU/CPE
3

Video Description

Welcome to Module 04 of the CISSP course! This module gets to the core of networking and data communications with an introduction to the OSI reference model. The OSI model is the foundation of networking protocols and governs the rules followed by all network devices. The protocols in the reference model are organized into layers and this is what is meant by "layered" protocols. These various layers correspond to the functions supported by network devices such as hubs, switches, routers, VLANs, and as it names implies, Layer-3 switches. We'll also have a look at wireless communications and the threats targeted against it. The various encryption protocols used in wireless communications will be discussed within this security context and these include WEP, WPA, and WPA-2. And don't think you can safely ignore WEP simply because it's outdated! Many devices that utilize it are still widely deployed. There's quite a bit of meat in this module and as such, is a very testable subject area on the CISSP exam!

Video Transcription

00:04
book at the outline. What we're gonna cover is very comparable to what you would expect. We're going to talk about the beloved O S I reference model
00:14
in just about any class you cake that's gonna cover networking. Security is gonna talk about that, Wes I model. And I think it's a very important model because it helps us understand. Um,
00:24
the various things that happened in networking we'll go into that now. By the time we've covered the Westside reference model,
00:32
we will have talked about various network protocols and network protocols really governed the rules of communication and various protocols have varying rules for communication. And the bottom line is we, of course, have to be using the same rules if we're gonna communicate successfully.
00:48
Ah, we will also have talked about network communication devices,
00:52
huh? Switch router, villain. Layer three switch because again, you know, when you're having this discussion on the S I model, it's really hard for me to tell you a routers, layer three without telling me what a router does. So, honestly, by the time we get through the s I model, we will have covered a lot
01:11
of the work That's in this chapter.
01:11
Also, firewalls will talk about that in the conclusion of the S on model because I think firewalls are a really good way to see the significance of O s. I. And then the final section that will cover is gonna be on wireless communications. I think you're gonna see a lot of questions there specifically
01:29
threats, wireless communications and the difference between the security mechanisms of weap
01:34
w p A and W p A to. And yes, they are very much still asking questions on wept. And if you think Weps weapons obsolete, you are wrong. Many companies still use wept. Ah, a lot of Internet service providers.
01:52
If you'll take a look at your router, you're gonna find a Web key on them. So wet
01:56
is not
01:59
Excuse me is not obsolete
02:00
should be, but it isn't so. We'll talk about the differences between those three mechanisms. Like I said, that's a very testable chapter. So take some good notes, rely on the experience you have with telecommunications in network security

Up Next

Communication & Network Security

Domain 4 focuses specifically on the basic network and telecommunications concepts. This includes, but is not limited to: secure network architecture design ...

Instructed By

Instructor Profile Image
Kelly Handerhan
Senior Instructor