Note: This training maps to a number of the exam topics on the Microsoft Technology Associate (MTA) Security Fundamentals exam (98-367). See https://www.microsoft.com/learning/en-us/exam-98-367.aspx for more information.
- Implementing secure content management (SCM)
- Implementing unified threat management (UTM)
- Introducing VLANs
- NAT addressing
- Network sniffing
- Understanding common attack methods, such as password attacks
- Protecting clients with antivirus software
- Implementing physical security
Skill Level Beginner
- Hello, I'm Lisa Bock and welcome to Foundations of IT Security Networking. Understanding how to secure a network is paramount in today's world, as we are all essentially interconnected. Data is either in motion or at rest and protection is implemented in a number of different ways. Logically securing the network is not enough. We must look at the entire organization, including user policies and physical security, which is one of the most over-looked forms of security.
In this course, I'll introduce you to some of the security devices and practices used in the industry today, including firewalls, unified threat management, and secure content management. We will review network isolation, protocol security, client protection, physical security, and mobile device security. At thie end of this course, you'll have a solid understanding of network security concepts and you'll be ready to dig even deeper into other aspects of network security.
Now, let's get started.