Get hands-on experience in Network Security with the IT Specialist Network Security comprehensive course and lab. The lab provides hands-on learning of Network Security, beginning up with the basics to gain insights into Authentication, Authorization, Accounting, security layers, and protecting the server and clients. This course provides candidates with foundational security knowledge and skills, including an understanding of core security principles operating system security, network, and device security, and secure computing practices. The course and lab provide knowledge in a broad range of IT topics, including software development, database administration, networking and security, mobility and device management, and coding.

starstarstarstarstar_half

* Actual course outline may vary depending on offering center. Contact your sales representative for more information.

Learning Objectives

Gain the foundational knowledge you need to take the first steps on this topic.

1
  • Introduction

  • Course Opening: How to Study

2
  • Understanding Security Layers

  • Introducing Core Security Principles
    Understanding Physical Security as the First Line of Defense
    Performing Threat Modeling
    Skill Summary
    Business Case Scenarios
    Workplace Ready

3
  • Understanding Authentication, Authorization, and Accounting

  • Starting Security with Authentication
    Introducing Directory Services with Active Directory
    Comparing Rights and Permissions
    Understanding NTFS
    Sharing Drives and Folders
    Introducing the Registry
    Using Encryption to Protect Data
    Understanding IPsec
    Introducing Smart Cards
    Configuring Biometrics, Windows Hello, and Microsoft Passport
    Using Auditing to Complete the Security Picture
    Skill Summary
    Business Case Scenarios
    Workplace Ready

4
  • Understanding Security Policies

  • Understanding Information Security Policies and Their Types
    Using Password Policies to Enhance Security
    Protecting Domain User Account Passwords
    Skill Summary
    Business Case Scenarios
    Workplace Ready

5
  • Understanding Network Security

  • Using Dedicated Firewalls to Protect a Network
    Using Isolation to Protect the Network
    Protecting Data with Protocol Security
    Understanding Denial-of-Service (DoS) Attacks
    Skill Summary
    Business Case Scenarios
    Workplace Ready

6
  • Protecting the Server and Client

  • Protecting the Client Computer
    Managing Client Security Using Windows Defender
    Protecting Your Email
    Securing Internet Explorer
    Configuring Microsoft Edge
    Protecting Your Server
    Using Security Baselines
    Locking Down Devices to Run Only Trusted Applications
    Managing Windows Store Apps
    Skill Summary
    Business Case Scenarios
    Workplace Ready

7
  • Appendix

  • Exam Tips

Audience

IT professionals entering security fields will benefit from this course.

Language

English

Prerequisites

There are no rerequisites for this course.

Length: 365.0 days ( hours)

Level:

Not Your Location? Change

Course Schedule:

To request a custom delivery, please chat with an expert.

Loading...