This training course examines communications and network security. It covers the different types of networks and different transmission technologies and the two main models that govern how networks work, the OSI model and the TCP/IP model, and their related layers. This course also features a number of fictional scenarios that will help you apply what you've learned to situations you may encounter in the real world. This course requires a basic understanding of IT concepts.
Network Security Scenarios
Professional Credits:
Completion Time
5 hours
Access Time
90 Days
Outcome
Individual Skill Course
Language
English
Training Level
Intermediate
Delivery Information:
Description
Learning Outcomes
- Discuss the general concepts that enable networking and its role in information technology
- Compare the different types of networks, including LANs, WANs, and MANs, as well as the Internet, intranets, and extranets
- Explain what the Open Systems Interconnection (OSI) Reference Model is and identify its seven layers
- Contrast the OSI model with the TCP/IP Model
- Identify common protocols and differentiate among network, routing, and data link protocols
- Describe the functions of common networking devices, including bridges, routers, hubs, repeaters, switches, and firewalls
- Discuss how wireless networks work and the technology that enables them
- Identify common network attacks and how they can be prevented
- Analyze a real-world scenario and make appropriate recommendations to address and improve network security
Additional Information
This course includes an “Ask the Expert” feature. You can use this feature to submit questions about course content. A subject matter expert will provide guidance or point you to additional resources for the topics you’re studying. Questions are answered as quickly as possible and usually within 24 hours.
Learners must achieve an average test score of at least 70% to meet the minimum successful completion requirement and qualify to receive IACET CEUs.
Requirements
Technology Requirements
Hardware Requirements: This course can be taken on either a PC, Mac, or Chromebook.
Software Requirements: Software must be installed and fully operational before the course begins.
- PC: Windows 8 or later.
- Mac: macOS 10.6 or later.
- Browser: The latest version of Google Chrome or Mozilla Firefox are preferred. Microsoft Edge and Safari are also compatible. Cookies and JavaScript must be enabled
- The latest Adobe Reader/Acrobat Reader ( free download available at https://get.adobe.com/reader/ )
- Any modern Office suite: Microsoft Office, Apple iWork, OpenOffice, or LibreOffice
- Reliable internet connection. Broadband cable or highspeed DSL is recommended for optimal experience.
- E-mail account (to be able to register and to receive e-mail from the course system regarding registration, course status, etc.)
Prerequisites
This course requires a basic understanding of IT concepts.
Reviews
"The module is beneficial and the scenario offered help to develop the reflexes of network security."
Reda B.
"This class was organized, the information was current, and it was very informative."
Sidney P.
Enroll My Team
Are you looking to enroll your team in this training Course? You Can:
Option 1
Click "Add to Cart" and then update the number of seats you'd like to purchase in yout cart.
Add to Cart