Learn your way! Get started

CompTIA NET+ Cert, Part 15 of 17: Network Security[replaced]

with expert Patrick Loner


Watch trailer


Course at a glance

Included in these subscriptions:

  • Dev & IT Pro Video
  • Dev & IT Pro Power Pack

Release date 4/5/2017
Level Intermediate
Runtime 2h 7m
Closed captioning N/A
Transcript N/A
eBooks / courseware N/A
Hands-on labs N/A
Sample code N/A
Exams Included


Enterprise Solutions

Need reporting, custom learning tracks, or SCORM? Learn More



Course description

** this course is updated for current certification N10-008 with parts 1 through 7 starting at https://www.learnnowonline.com/course/npe** This course will focus on Domain 3.0 of the CompTIA NET+ Certification Exam N10-006, a largely changed objective which has been considerably expanded. Areas to be explored include risk assessment, business continuity, disaster recovery, and high availability, as well as mitigating risk utilizing network hardening on operating systems and devices. In addition, the fundamentals of network forensics to ascertain a compromised system will be discussed.

Prerequisites

Parts 1 through 14 of the CompTIA NET+ series

Learning Paths

This course will help you prepare for the following certification and exam:
CompTIA Net+ Certification
N10-006: CompTIA Net+ Certification

Meet the expert

Patrick Loner has certifications for MCSA, MCSE, MCITP, A+, Network+, Security+, and more. He has been working as a Microsoft Certified Trainer, network administrator, and network consultant for over ten years. He has over a decade of experience working with and teaching about Windows networks with client and server operating systems. He has guided many students toward Microsoft and CompTIA certifications. Most recently, he has worked as a freelance trainer and network consultant specializing in Windows Server 2008 and Microsoft Exchange 2007 and Exchange 2010 implementations, design, and upgrades. Patrick continues to branch out now working with and training on Windows Server 2012, Windows 8, Exchange 2013, and System Center Configuration Manager 2012.

Course outline



Network Security

Overview of Network Security (07:32)
  • Introduction (00:51)
  • Objective Overview (01:39)
  • Subdomains (04:17)
  • Summary (00:44)
Risk Related Concepts (22:32)
  • Introduction (01:14)
  • Risk Related Concepts (01:17)
  • Threats (03:16)
  • Vulnerabilities (01:21)
  • Identifying Vulnerabilities (02:23)
  • Risk (04:51)
  • User Awareness (02:56)
  • Regulatory and Legislative Requirements (00:55)
  • Continuity and Recovery (03:20)
  • Summary (00:54)
Vulnerabilities and Threats (34:36)
  • Introduction (01:04)
  • Identifying Threats and Vulnerabilities (01:06)
  • Types of Attackers (03:07)
  • Types of Threats (02:27)
  • Malicious Code Attacks (02:57)
  • Common Categories of Attacks (02:49)
  • Network Threats (01:31)
  • Port Scanning and Eavesdropping (02:43)
  • Denial of Service (06:58)
  • Man-in-the-Middle Attacks (02:51)
  • Wireless Vulnerabilities and Threats (03:12)
  • Vulnerability Types (02:50)
  • Summary (00:56)

Implementing Security Measures

Network Hardening (17:33)
  • Introduction (00:47)
  • Network Hardening (02:56)
  • Anti-Malware Software (02:27)
  • Network Devices (05:10)
  • Network Communications (05:21)
  • Summary (00:49)
Physical Security (10:09)
  • Introduction (00:47)
  • Physical Security Controls (02:31)
  • Elements of Physical Security (05:52)
  • Summary (00:58)
Basic Firewalls (08:42)
  • Introduction (00:51)
  • Basic Firewalls (02:55)
  • Firewall Types and Capabilities (04:09)
  • Summary (00:47)
Network Access Control (14:57)
  • Introduction (00:35)
  • Network Access Control Models (06:19)
  • Concepts of Network Access Control (07:03)
  • Summary (00:58)
Computer Forensic Fundamentals (11:38)
  • Introduction (00:54)
  • Computer Forensic Fundamentals (03:18)
  • The Forensics Process (01:09)
  • First Steps (00:55)
  • Other Forensics Concepts (04:17)
  • Summary (01:01)