While many network managers take security into consideration, the reality is that their primary, day-to-day focus is on another matter entirely: uptime. Information security pros can become valuable partners in fortifying the network, but only if they are fluent in how networks -- and all their various components -- are built and operated. Simply put, you can’t secure what you don’t understand.
In this Security School, based on (ISC)² CISSP training material on Domain 4 of the exam, learn about networking and network security fundamentals, including the OSI model, secure routing methods, partitioning, different types of network-based attacks and more. In his video, expert Adam Gordon dissects each layer of the OSI model -- taking viewers from the application down all the way to the physical layer -- and outlines essential takeaways for infosec pros each step of the way. In his tip, Gordon explores different methods of isolating infrastructure to evade common network attacks.
Once you've reviewed the parts of this Security School on, take the quiz to see how much you have learned about network security fundamentals, network architectures and other core concepts covered in Domain 4.
View our Security School Course Catalog to view more schools.
CISSP® is a registered mark of (ISC)².
Get acquainted with network security fundamentals
There's no getting around it -- networking is technical. You'll need to use a different part of your brain than you would for concepts like compliance or data ownership. Whether packet headers make you feel right at home or want to head for the hills, this guide to network security fundamentals will help you get fully prepared for Domain 4 of the CISSP exam.
Do you know what each layer of the OSI model represents? Infosec expert Adam Gordon helps you get up to speed in preparation for Domain 4 of the CISSP exam. Continue Reading
It may sound like network security basics, but don't underestimate the power of proper segmentation and isolation as an effective way to protect your enterprise network from attack. Continue Reading