Download IT Security Foundations: Network Security Course By Lynda
Network security is an important component of the Microsoft Technology Associate (MTA), Security Fundamentals exam (98-367). In this course, Lisa Bock covers one of the main topics of the exam: securing an organization's network, to keep interconnected systems and data safe. The course introduces security devices such as firewalls and honeypots. In addition, she reviews the importance of isolating networks with VLANS and NAT addressing, along with a review of common security protocols. She also provides overviews of how to protect clients with antivirus software, encrypt folders and files, and implement software restriction policies. Finally, she looks at the often-overlooked topic of physical security, which includes securing a building's perimeter and the hardware within.
Note: Learn more about the Microsoft Technology Associate (MTA) Security Fundamentals exam (98-367) at https://www.microsoft.com/learning/en-us/exam-98-367.aspx.
- Describe ways a security baseline can ensure that all device configuration settings are in line with the organization’s baseline metric.
- Examine methods for ensuring physical security.
- Examine the three levels for software-restriction policies.
- Explore how VLANS can protect the network.
- Identify the different ways malicious actors can spoof protocols on the network.
- List common devices that are used to protect and defend a network.
- Recognize how antivirus software protects your system against malware.
- Recognize how server and domain isolation can isolate and protect subnetworks.
- Recognize the threat of password attacks.
- Recognize the various ways to use and secure protocols, in order to minimize risk and prevent attacks.
- [Lisa] Managing a network today requires a proactive approach to reduce overall risk. When taking steps to secure an organization's network, there are a few best practices that will help to keep your interconnected systems and data safe. Data is either in motion or at rest and protection is implemented in a number of different ways. Logically securing the network is not enough. We must look at the entire organization, including user policies and physical security. In this course, I'll introduce you to some of the security devices and practices used in industry today. I'll review the importance of network isolation, using protocol security, protecting the client, and limiting physical access to infrastructure devices. Hello, my name is Lisa Bock and I'm a security ambassador. If you're ready, let's lock down your network so you can minimize your risk of being a victim of a network attack. Now, let's get started.
دانلود کنید !