Foundations of IT Security: Network SecurityFoundations of IT Security: Network Security
Title rated 0 out of 5 stars, based on 0 ratings(0 ratings)
Unknown, 2015
Current format, Unknown, 2015, , Available.Unknown, 2015
Current format, Unknown, 2015, , Available. Offered in 0 more formatsLearn how to secure an organization's networḱkeeping your interconnected systems and data saféand prep for MTA Exam 98-367.
Network security is the keystone of IT security, and an important component of the Microsoft Technology Associate (MTA) Security Fundamentals exam (98-367). In this installment of Foundations of IT Security, series creator Lisa Bock will cover one of the main topics of the exam: securing an organization's network to keep interconnected systems and data safe. The course introduces security devices such as firewalls and packet inspectors, network isolation, and common security protocols. She also provides an overview of how to protect clients with antivirus software, encrypt offline files, and implement software restriction policies. Finally, she looks at the often-overlooked topics of mobile device and physical security, which includes securing a building's perimeter and the hardware within. Note: This training maps to a number of the exam topics on the Microsoft Technology Associate (MTA) Security Fundamentals exam (98-367). See https://www.microsoft.com/learning/en-us/exam-98-367.aspx for more information.
Network security is the keystone of IT security, and an important component of the Microsoft Technology Associate (MTA) Security Fundamentals exam (98-367). In this installment of Foundations of IT Security, series creator Lisa Bock will cover one of the main topics of the exam: securing an organization's network to keep interconnected systems and data safe. The course introduces security devices such as firewalls and packet inspectors, network isolation, and common security protocols. She also provides an overview of how to protect clients with antivirus software, encrypt offline files, and implement software restriction policies. Finally, she looks at the often-overlooked topics of mobile device and physical security, which includes securing a building's perimeter and the hardware within. Note: This training maps to a number of the exam topics on the Microsoft Technology Associate (MTA) Security Fundamentals exam (98-367). See https://www.microsoft.com/learning/en-us/exam-98-367.aspx for more information.
Title availability
About
Contributors
Details
Publication
- Carpenteria, CA lynda.com, 2015., ℗♭2015
Opinion
More from the community
Community lists featuring this title
There are no community lists featuring this title
Community contributions
There are no quotations from this title
There are no quotations from this title
From the community