IT Specialist Network Security

(ITSPC-NET-SEC)/ISBN:978-1-64459-335-6

This course includes
Lessons
TestPrep
Hand-on Lab
AI Tutor (Add-on)

Get hands-on experience in Network Security with the IT Specialist Network Security comprehensive course and lab. The lab provides hands-on learning of Network Security, beginning up with the basics to gain insights into Authentication, Authorization, Accounting, security layers, and protecting the server and clients. This course provides candidates with foundational security knowledge and skills, including an understanding of core security principles operating system security, network, and device security, and secure computing practices. The course and lab provide knowledge in a broad range of IT topics, including software development, database administration, networking and security, mobility and device management, and coding.

 

Lessons

7+ Lessons | 6+ Exercises | 58+ Quizzes | 182+ Flashcards | 182+ Glossary of terms

TestPrep

40+ Pre Assessment Questions | 2+ Full Length Tests | 40+ Post Assessment Questions | 80+ Practice Test Questions

Hand on lab

38+ LiveLab | 36+ Video tutorials | 51+ Minutes

Video Lessons

113+ Videos | 03:51+ Hours

Here's what you will learn

Download Course Outline

Lessons 1: Introduction

  • Course Opening: How to Study

Lessons 2: Understanding Security Layers

  • Introducing Core Security Principles
  • Understanding Physical Security as the First Line of Defense
  • Performing Threat Modeling
  • Skill Summary
  • Business Case Scenarios
  • Workplace Ready

Lessons 3: Understanding Authentication, Authorization, and Accounting

  • Starting Security with Authentication
  • Introducing Directory Services with Active Directory
  • Comparing Rights and Permissions
  • Understanding NTFS
  • Sharing Drives and Folders
  • Introducing the Registry
  • Using Encryption to Protect Data
  • Understanding IPsec
  • Introducing Smart Cards
  • Configuring Biometrics, Windows Hello, and Microsoft Passport
  • Using Auditing to Complete the Security Picture
  • Skill Summary
  • Business Case Scenarios
  • Workplace Ready

Lessons 4: Understanding Security Policies

  • Understanding Information Security Policies and Their Types
  • Using Password Policies to Enhance Security
  • Protecting Domain User Account Passwords
  • Skill Summary
  • Business Case Scenarios
  • Workplace Ready

Lessons 5: Understanding Network Security

  • Using Dedicated Firewalls to Protect a Network
  • Using Isolation to Protect the Network
  • Protecting Data with Protocol Security
  • Understanding Denial‐of‐Service (DoS) Attacks
  • Skill Summary
  • Business Case Scenarios
  • Workplace Ready

Lessons 6: Protecting the Server and Client

  • Protecting the Client Computer
  • Managing Client Security Using Windows Defender
  • Protecting Your Email
  • Securing Internet Explorer
  • Configuring Microsoft Edge
  • Protecting Your Server
  • Using Security Baselines
  • Locking Down Devices to Run Only Trusted Applications
  • Managing Windows Store Apps
  • Skill Summary
  • Business Case Scenarios
  • Workplace Ready

Appendix

  • Exam Tips

Hands-on LAB Activities

Understanding Authentication, Authorization, and Accounting

  • Creating OUs in a Domain
  • Using a Hashing Algorithm
  • Moving Objects into an OU
  • Creating a GPO
  • Changing NTFS Permissions on a Folder
  • Copying Files
  • Moving Files
  • Understanding Permission Inheritance
  • Using Groups to Assign Permissions
  • Sharing a Folder
  • Encrypting a Folder with the EFS
  • Encrypting the Drive Using BitLocker
  • Performing Symmetric Encryption
  • Performing Asymmetric Encryption
  • Creating a VPN Connection
  • Configuring an IPsec Policy
  • Changing the Audit Policy
  • Modifying Kerberos Security Settings

Understanding Security Policies

  • Configuring the Domain Password Policy
  • Configuring the Account Lockout Policy
  • Creating a Domain User Account

Understanding Network Security

  • Scanning Ports Using Nmap
  • Implementing a Packet Filter
  • Using Honeypot
  • Performing a SYN Flood Attack

Protecting the Server and Client

  • Taking an Incremental Backup
  • Taking a Full Backup
  • Customizing User Account Notification Settings
  • Encrypting Offline Files
  • Controlling How Updates Are Applied
  • Scanning Using Windows Defender
  • Configuring Pop-up Blocker Settings
  • Enabling IE ESC for Administrators
  • Performing a Phishing Attack
  • Installing DHCP Server
  • Capturing Network Traffic Using Network Monitor
  • Performing an MBSA Scan
  • Configuring Folder Attributes