Network security is the keystone of IT security, and an important component of the Microsoft Technology Associate (MTA) Security Fundamentals exam (98-367). In this installment of Foundations of IT Security, series creator Lisa Bock will cover one of the main topics of the exam: securing an organization's network to keep interconnected systems and data safe. The course introduces security devices such as firewalls and packet inspectors, network isolation, and common security protocols. She also provides an overview of how to protect clients with antivirus software, encrypt offline files, and implement software restriction policies. Finally, she looks at the often-overlooked topics of mobile device and physical security, which includes securing a building's perimeter and the hardware within.
乐虎体育在线 Note: This training maps to a number of the exam topics on the Microsoft Technology Associate (MTA) Security Fundamentals exam (98-367). See for more information.
Author - Ethical Hacking: Penetration Testing
Since 2004, Lisa Bock has been teaching IT, everything from forensics to network security.
Lisa is an associate professor in the Information Technology department at Pennsylvania College of Technology, in Williamsport, PA. Courses she has taught during the past 13 years include: networking, security, biometrics, technical support, protocol vulnerabilities (using Wireshark), CCNA Security, and VoIP and Unified Communications. She holds an MS from University of Maryland University College (UMUC) along with numerous other certifications. She has had training in forensics, networking, steganography, and network security. She is involved with various volunteer activities, has evaluated professional journals, and is an award-winning speaker. Lisa and her husband Mike enjoy bike riding, watching movies, and traveling.
- Since 2004, Lisa Bock has been teaching IT, everything from forensics to network security.
Skills covered in this course
- Hello, I'm Lisa Bock and welcome to Foundations of IT Security Networking. Understanding how to secure a network is paramount in today's world, as we are all essentially interconnected. Data is either in motion or at rest and protection is implemented in a number of different ways. Logically securing the network is not enough. We must look at the entire organization, including user policies and physical security, which is one of the most over-looked forms of security. In this course, I'll introduce you to some of the security devices and practices used in the industry today, including firewalls, unified threat management, and secure content management. We will review network isolation, protocol security, client protection, physical security, and mobile device security. At thie end of this course, you'll have a solid understanding of network security concepts and you'll be ready to dig even deeper into other aspects of network security. Now, let's get started.
Practice while you learn with exercise files
Download the files the instructor uses to teach the course. Follow along and learn by watching, listening and practicing.
Download the exercise files for this course. Get started with a free trial today.
Download courses and learn on the go
Watch courses on your mobile device without an internet connection. Download courses using your iOS or Android LinkedIn Learning app.
Watch this course anytime, anywhere. Get started with a free trial today. 乐虎体育在线