Course description
This course is a part of the CompTIA Net+ body of knowledge focusing on the N10-008 Exam. This course covers: network security fundamentals, planning security, identify threats and vulnerabilities and how to protect the network.
Prerequisites
This course assumes the user has some experience with computer hardware, software, and understands the concept of a computer network.
Meet the expert
Patrick Loner has certifications for MCSA, MCSE, MCITP, A+, Network+, Security+, and more. He has been working as a Microsoft Certified Trainer, network administrator, and network consultant for over ten years. He has over a decade of experience working with and teaching about Windows networks with client and server operating systems. He has guided many students toward Microsoft and CompTIA certifications. Most recently, he has worked as a freelance trainer and network consultant specializing in Windows Server 2008 and Microsoft Exchange 2007 and Exchange 2010 implementations, design, and upgrades. Patrick continues to branch out now working with and training on Windows Server 2012, Windows 8, Exchange 2013, and System Center Configuration Manager 2012.
Course outline
Module 8
Network Security Fundamentals (22:12)
- Introduction (00:08)
- Intro to Network Security (01:39)
- CIA Triad (02:15)
- Network Threats (01:23)
- Network Vulnerabilities (02:24)
- Understanding Risks (01:16)
- What is AAAA (01:36)
- Cryptography (01:29)
- Algorithms and Keys (02:04)
- Digital Signatures (01:10)
- Best Practices for Permissions (01:52)
- Best Practices for Employees (02:07)
- Defense in Depth (02:35)
- Summary (00:08)
Planning for Network Security (10:50)
- Introduction (00:08)
- Planning for Network Security (02:03)
- Threat Vulnerability Pairs (01:13)
- Identifying Vulnerabilities (01:56)
- Types of Vulnerabilities (01:17)
- Mitigating Risks (03:08)
- Risk Assessments (00:54)
- Summary (00:08)
Identifying Threats and Vulnerabilities (17:45)
- Introduction (00:08)
- Threat Categories (01:05)
- Software Attacks (00:36)
- Malicious Code Attacks (00:50)
- Types of Malicious Code (03:52)
- Network Attacks (00:51)
- Port Scanning (01:31)
- IP Spoofing (00:44)
- Denial of Service (01:45)
- On-Path Attacks (01:40)
- Human Attacks (02:50)
- Wireless Vulnerabilities and Threats (01:39)
- Summary (00:08)
Protecting the Network (33:34)
- Introduction (00:08)
- Protecting the Network (01:22)
- Implement Physical Protection (00:57)
- Physical Security Options (01:58)
- Anti-Malware (02:23)
- Network Hardening (02:16)
- SEcuring Network Communications (03:38)
- Wireless Security (02:42)
- Authentication (01:55)
- Authentication Factors (01:30)
- Network Access Control (00:53)
- Demo: Anti Malware Options (04:59)
- Demo: Hardening and IPSec (08:41)
- Summary (00:08)