Building IT Security Foundations - Network Security
0.0 (0 ratings)
Course Ratings are calculated from individual students’ ratings and a variety of other signals, like age of rating and reliability, to ensure that they reflect course quality fairly and accurately.
15 students enrolled

Building IT Security Foundations - Network Security

Learn how to secure an organization's network to keep your interconnected systems and data safe
New
0.0 (0 ratings)
Course Ratings are calculated from individual students’ ratings and a variety of other signals, like age of rating and reliability, to ensure that they reflect course quality fairly and accurately.
15 students enrolled
Created by Nadir Ben Bala
Published 8/2020
English
Current price: $69.99 Original price: $99.99 Discount: 30% off
5 hours left at this price!
30-Day Money-Back Guarantee
This course includes
  • 2 hours on-demand video
  • Full lifetime access
  • Access on mobile and TV
  • Certificate of Completion
Training 5 or more people?

Get your team access to 4,000+ top Udemy courses anytime, anywhere.

Try Udemy for Business
What you'll learn
  • IT Security Foundations: Network Security.
  • Examine methods for ensuring physical security.
  • Identify the different ways malicious actors can spoof protocols on the network.
Course content
Expand 31 lectures 01:59:07
+ IT Security Foundations
31 lectures 01:59:07
Prepare for MTA exam 98-367
01:19
Luring with honeypots
06:26
Keeping the OS and software updated
01:41
Segmenting using routers and VLANS
05:45
Creating server and domain isolation
04:39
Securing the perimeter network
02:27
Translating the network address
06:28
Comparing attack methods
05:39
Attacking passwords
03:28
Sniffing the network
04:28
Spoofing protocols
03:21
Poison the ARP cache
04:12
Challenge- Password strength
01:31
Solution- Password strength
01:57
Securing Internet Protocol
05:53
Protecting DHCP
02:45
Using antivirus
05:21
User Account Control (UAC)
04:19
Encrypting folders and files
03:35
Setting software restriction policies
02:04
Encrypting data in transit
05:29
Protecting buildings
04:57
Securing hardware
02:34
Challenge- Physical security requirements
01:32
Solution- Physical security requirements
01:18
Requirements
  • You should already know a few things about basic networking (TCP/IP)
Description

Network security is an important component of the Microsoft Technology Associate (MTA), Security Fundamentals exam (98-367). In this course, Lisa Bock covers one of the main topics of the exam: securing an organization's network, to keep interconnected systems and data safe. The course introduces security devices such as firewalls and honeypots. In addition, she reviews the importance of isolating networks with VLANS and NAT addressing, along with a review of common security protocols. She also provides overviews of how to protect clients with antivirus software, encrypt folders and files, and implement software restriction policies. Finally, she looks at the often-overlooked topic of physical security, which includes securing a building's perimeter and the hardware within.


Topics include:

  • Describe ways a security baseline can ensure that all device configuration settings are in line with the organization’s baseline metric.

  • Examine methods for ensuring physical security.

  • Examine the three levels for software-restriction policies.

  • Explore how VLANS can protect the network.

  • Identify the different ways malicious actors can spoof protocols on the network.

  • List common devices that are used to protect and defend a network.

  • Recognize how antivirus software protects your system against malware.

  • Recognize how server and domain isolation can isolate and protect subnetworks.

  • Recognize the threat of password attacks.

  • Recognize the various ways to use and secure protocols, in order to minimize risk and prevent attacks.

Who this course is for:
  • This course is for beginners and IT pros looking to get certified and land an entry level Cyber Security position paying upwards of six figures! There are currently over a million Cyber Security job openings global and demand is greatly outpacing supply which means more opportunity, job security and higher pay for you! Each chapter closes with exercises putting your new learned skills into practical use immediately. You will start by understand Network Security Concepts and Architectures including technologies such as Intrusion Detection Systems and Web Application Firewalls.