Moocable is learner-supported. When you buy through links on our site, we may earn an affiliate commission.
Description
Learn how to secure an organization's network to keep your interconnected systems and data safe and prepare for Microsoft Technology Associate (MTA) exam 98-367.
Tags
Syllabus
Introduction
- Securing the network
- Prepare for MTA exam 98-367
- Reviewing firewalls
- Luring with honeypots
- Keeping the OS and software updated
- Assessing security baselines
- Segmenting using routers and VLANS
- Creating server and domain isolation
- Securing the perimeter network
- Translating the network address
- Comparing attack methods
- Attacking passwords
- Sniffing the network
- Spoofing protocols
- Poison the ARP cache
- Challenge: Password strength
- Solution: Password strength
- Securing DNS
- Securing Internet Protocol
- Protecting DHCP
- Using antivirus
- User Account Control (UAC)
- Encrypting folders and files
- Setting software restriction policies
- Using the principle of least privilege
- Encrypting data in transit
- Protecting buildings
- Securing hardware
- Controlling access
- Challenge: Physical security requirements
- Solution: Physical security requirements
- What's next
![](https://d3f1iyfxxz8i1e.cloudfront.net/courses/course_image/cdf4af275cf4.jpeg)
IT Security Foundations: Network Security
Affiliate notice
-
TypeOnline Course
-
Provider
Learn how to secure an organization's network to keep your interconnected systems and data safe and prepare for Microsoft Technology Associate (MTA) exam 98-367.
Introduction
- Securing the network
- Prepare for MTA exam 98-367
- Reviewing firewalls
- Luring with honeypots
- Keeping the OS and software updated
- Assessing security baselines
- Segmenting using routers and VLANS
- Creating server and domain isolation
- Securing the perimeter network
- Translating the network address
- Comparing attack methods
- Attacking passwords
- Sniffing the network
- Spoofing protocols
- Poison the ARP cache
- Challenge: Password strength
- Solution: Password strength
- Securing DNS
- Securing Internet Protocol
- Protecting DHCP
- Using antivirus
- User Account Control (UAC)
- Encrypting folders and files
- Setting software restriction policies
- Using the principle of least privilege
- Encrypting data in transit
- Protecting buildings
- Securing hardware
- Controlling access
- Challenge: Physical security requirements
- Solution: Physical security requirements
- What's next
Tags
Loading...
Saving...
Loading...