O'Reilly logo

CISSP in 21 Days by M. L. Srinivasan

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 15. Day 14: Telecommunications and Network Security

The telecommunications and network security domain consists of networking models that are made of many protocols. OSI and TCP/IP are the most important models that follow a layered approach to networking. Yesterday we covered some of the important concepts in these two models. From the security perspective, we've covered important application layer protocols, their applications, threats, vulnerabilities, attacks, and countermeasures in the TCP/IP suit. Today we'll focus on other protocols that constitute the TCP/IP layers. We'll also discuss some of the communication technologies at the end of this chapter to conclude our discussion of the domain.

At the end of the day, you should understand ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required