Get hands-on experience in Network Security with the IT Specialist Network Security comprehensive course and lab. The lab provides hands-on learning of Network Security, beginning up with the basics to gain insights into Authentication, Authorization, Accounting, security layers, and protecting the server and clients. This course provides candidates with foundational security knowledge and skills, including an understanding of core security principles operating system security, network, and device security, and secure computing practices. The course and lab provide knowledge in a broad range of IT topics, including software development, database administration, networking and security, mobility and device management, and coding.
Lessons
7+ Lessons | 6+ Exercises | 58+ Quizzes | 182+ Flashcards | 182+ Glossary of terms
TestPrep
40+ Pre Assessment Questions | 2+ Full Length Tests | 40+ Post Assessment Questions | 80+ Practice Test Questions
Hand on lab
38+ LiveLab | 36+ Video tutorials | 51+ Minutes
Video Lessons
113+ Videos | 03:51+ Hours
Lessons 1: Introduction
- Course Opening: How to Study
Lessons 2: Understanding Security Layers
- Introducing Core Security Principles
- Understanding Physical Security as the First Line of Defense
- Performing Threat Modeling
- Skill Summary
- Business Case Scenarios
- Workplace Ready
Lessons 3: Understanding Authentication, Authorization, and Accounting
- Starting Security with Authentication
- Introducing Directory Services with Active Directory
- Comparing Rights and Permissions
- Understanding NTFS
- Sharing Drives and Folders
- Introducing the Registry
- Using Encryption to Protect Data
- Understanding IPsec
- Introducing Smart Cards
- Configuring Biometrics, Windows Hello, and Microsoft Passport
- Using Auditing to Complete the Security Picture
- Skill Summary
- Business Case Scenarios
- Workplace Ready
Lessons 4: Understanding Security Policies
- Understanding Information Security Policies and Their Types
- Using Password Policies to Enhance Security
- Protecting Domain User Account Passwords
- Skill Summary
- Business Case Scenarios
- Workplace Ready
Lessons 5: Understanding Network Security
- Using Dedicated Firewalls to Protect a Network
- Using Isolation to Protect the Network
- Protecting Data with Protocol Security
- Understanding Denial?of?Service (DoS) Attacks
- Skill Summary
- Business Case Scenarios
- Workplace Ready
Lessons 6: Protecting the Server and Client
- Protecting the Client Computer
- Managing Client Security Using Windows Defender
- Protecting Your Email
- Securing Internet Explorer
- Configuring Microsoft Edge
- Protecting Your Server
- Using Security Baselines
- Locking Down Devices to Run Only Trusted Applications
- Managing Windows Store Apps
- Skill Summary
- Business Case Scenarios
- Workplace Ready
Appendix
- Exam Tips
Hands-on LAB Activities
Understanding Authentication, Authorization, and Accounting
- Creating OUs in a Domain
- Using a Hashing Algorithm
- Moving Objects into an OU
- Creating a GPO
- Changing NTFS Permissions on a Folder
- Copying Files
- Moving Files
- Understanding Permission Inheritance
- Using Groups to Assign Permissions
- Sharing a Folder
- Encrypting a Folder with the EFS
- Encrypting the Drive Using BitLocker
- Performing Symmetric Encryption
- Performing Asymmetric Encryption
- Creating a VPN Connection
- Configuring an IPsec Policy
- Changing the Audit Policy
- Modifying Kerberos Security Settings
Understanding Security Policies
- Configuring the Domain Password Policy
- Configuring the Account Lockout Policy
- Creating a Domain User Account
Understanding Network Security
- Scanning Ports Using Nmap
- Implementing a Packet Filter
- Using Honeypot
- Performing a SYN Flood Attack
Protecting the Server and Client
- Taking an Incremental Backup
- Taking a Full Backup
- Customizing User Account Notification Settings
- Encrypting Offline Files
- Controlling How Updates Are Applied
- Scanning Using Windows Defender
- Configuring Pop-up Blocker Settings
- Enabling IE ESC for Administrators
- Performing a Phishing Attack
- Installing DHCP Server
- Capturing Network Traffic Using Network Monitor
- Performing an MBSA Scan
- Configuring Folder Attributes
Reviews
There are no reviews yet.