IT Specialist Network Security

(ITSPC-NET-SEC) / ISBN : 978-1-64459-335-6
This course includes
Hands-On Labs
AI Tutor (Add-on)
Get A Free Trial

About This Course

Get hands-on experience in Network Security with the IT Specialist Network Security comprehensive course and lab. The lab provides hands-on learning of Network Security, beginning up with the basics to gain insights into Authentication, Authorization, Accounting, security layers, and protecting the server and clients. This course provides candidates with foundational security knowledge and skills, including an understanding of core security principles operating system security, network, and device security, and secure computing practices. The course and lab provide knowledge in a broad range of IT topics, including software development, database administration, networking and security, mobility and device management, and coding.


Skills You’ll Get

Get the support you need. Enroll in our Instructor-Led Course.


7+ Lessons | 6+ Exercises | 58+ Quizzes | 182+ Flashcards | 182+ Glossary of terms


40+ Pre Assessment Questions | 2+ Full Length Tests | 40+ Post Assessment Questions | 80+ Practice Test Questions

Hands-On Labs

38+ LiveLab | 36+ Video tutorials | 51+ Minutes

Video Lessons

113+ Videos | 03:51+ Hours



  • Course Opening: How to Study

Understanding Security Layers

  • Introducing Core Security Principles
  • Understanding Physical Security as the First Line of Defense
  • Performing Threat Modeling
  • Skill Summary
  • Business Case Scenarios
  • Workplace Ready

Understanding Authentication, Authorization, and Accounting

  • Starting Security with Authentication
  • Introducing Directory Services with Active Directory
  • Comparing Rights and Permissions
  • Understanding NTFS
  • Sharing Drives and Folders
  • Introducing the Registry
  • Using Encryption to Protect Data
  • Understanding IPsec
  • Introducing Smart Cards
  • Configuring Biometrics, Windows Hello, and Microsoft Passport
  • Using Auditing to Complete the Security Picture
  • Skill Summary
  • Business Case Scenarios
  • Workplace Ready

Understanding Security Policies

  • Understanding Information Security Policies and Their Types
  • Using Password Policies to Enhance Security
  • Protecting Domain User Account Passwords
  • Skill Summary
  • Business Case Scenarios
  • Workplace Ready

Understanding Network Security

  • Using Dedicated Firewalls to Protect a Network
  • Using Isolation to Protect the Network
  • Protecting Data with Protocol Security
  • Understanding Denial‐of‐Service (DoS) Attacks
  • Skill Summary
  • Business Case Scenarios
  • Workplace Ready

Protecting the Server and Client

  • Protecting the Client Computer
  • Managing Client Security Using Windows Defender
  • Protecting Your Email
  • Securing Internet Explorer
  • Configuring Microsoft Edge
  • Protecting Your Server
  • Using Security Baselines
  • Locking Down Devices to Run Only Trusted Applications
  • Managing Windows Store Apps
  • Skill Summary
  • Business Case Scenarios
  • Workplace Ready


  • Exam Tips


Understanding Authentication, Authorization, and Accounting

  • Creating OUs in a Domain
  • Using a Hashing Algorithm
  • Moving Objects into an OU
  • Creating a GPO
  • Changing NTFS Permissions on a Folder
  • Copying Files
  • Moving Files
  • Understanding Permission Inheritance
  • Using Groups to Assign Permissions
  • Sharing a Folder
  • Encrypting a Folder with the EFS
  • Encrypting the Drive Using BitLocker
  • Performing Symmetric Encryption
  • Performing Asymmetric Encryption
  • Creating a VPN Connection
  • Configuring an IPsec Policy
  • Changing the Audit Policy
  • Modifying Kerberos Security Settings

Understanding Security Policies

  • Configuring the Domain Password Policy
  • Configuring the Account Lockout Policy
  • Creating a Domain User Account

Understanding Network Security

  • Scanning Ports Using Nmap
  • Implementing a Packet Filter
  • Using Honeypot
  • Performing a SYN Flood Attack

Protecting the Server and Client

  • Taking an Incremental Backup
  • Taking a Full Backup
  • Customizing User Account Notification Settings
  • Encrypting Offline Files
  • Controlling How Updates Are Applied
  • Scanning Using Windows Defender
  • Configuring Pop-up Blocker Settings
  • Enabling IE ESC for Administrators
  • Performing a Phishing Attack
  • Installing DHCP Server
  • Capturing Network Traffic Using Network Monitor
  • Performing an MBSA Scan
  • Configuring Folder Attributes

IT Specialist Network Security


Buy Now

Related Courses

All Course
scroll to top