Network Security Principles Course

In this course, we go over some general concepts related to network security as well as how to establish these principles through policies and procedures. We cover the concepts of defense in depth, backing up data, securing both voice and email, zero-trust networking policies and establishing best practices for IT security within your organization.

42 minutes

Course description

To begin the course, we discuss the principle of defense in depth (or layered defense) as a primary means to establishing IT security. We then cover proper procedures for backing up data and ensuring that the integrity of your data is protected. After this, we discuss voice security and proper methods to lock down your VoIP or PBX infrastructure. The importance of securing confidential business email is the next topic, where we discuss some of the email security methods that are used in organizations today. We finish the course with a discussion of the philosophy of “zero-trust networking” as well as some best practices related to network security in your organization.

Syllabus

Due Diligence and Best Practices

Video - 00:12:00

Zero-Trust Networking

Video - 00:04:00

Email Security

Video - 00:07:00

Voice

Video - 00:08:00

Data Integrity and Backups

Video - 00:06:00

Defense in Depth

Video - 00:06:00

Meet the author

Kevin Carter

Kevin Carter is the CEO and Founder of Mesh Networking LLC. Kevin has 15 years of experience in the finance and IT industries with an emphasis in IT and operations management. In the past, he has supervised day-to-day IT operations for multiple hedge funds with excess of $1 billion AUM, helping to implement and support IT infrastructure, trade operations, order management systems and market data applications.

From 2010-2016, Kevin was the Chief Technology Officer at Dialectic Capital Management, LP. Before he joined Dialectic, he was a field technician and CSA/SSA Manager at Richard Fleischman & Associates, a hedge fund IT consulting firm. Kevin is currently certified by (ISC)² (CISSP), Microsoft (MCSA, MCITP, MCDST, MCP), SolarWinds (SCP), VMware (VCA-DCV, VCA-Cloud, VCA-WM), Rackspace (CloudU), Bloomberg (BTTC, BESS), and Apple (ACA).

Unlock 7 days of free training

  • 1,400+ hands-on courses and labs
  • Certification practice exams
  • Skill assessments

Associated NICE Work Roles

All Infosec training maps directly to the NICE Workforce Framework for Cybersecurity to guide you from beginner to expert across 52 Work Roles.

  • Cyber Operator
  • Law Enforcement / Counterintelligence Forensics Analyst
  • Cyber Defense Forensics Analyst

Plans & pricing

Infosec Skills Personal

$299 / year

  • 190+ role-guided learning paths (e.g., Ethical Hacking, Threat Hunting)
  • 100s of hands-on labs in cloud-hosted cyber ranges
  • Custom certification practice exams (e.g., CISSP, Security+)
  • Skill assessments
  • Infosec peer community support

Infosec Skills Teams

$799 per license / year

  • Team administration and reporting
  • Dedicated client success manager
  • Single sign-on (SSO)
    Easily authenticate and manage your learners by connecting to any identity provider that supports the SAML 2.0 standard.
  • Integrations via API
    Retrieve training performance and engagement metrics and integrate learner data into your existing LMS or HRS.
  • 190+ role-guided learning paths and assessments (e.g., Incident Response)
  • 100s of hands-on labs in cloud-hosted cyber ranges
  • Create and assign custom learning paths
  • Custom certification practice exams (e.g., CISSP, CISA)
  • Optional upgrade: Guarantee team certification with live boot camps

Learn about scholarships and financing with

Affirm logo

Award-winning training you can trust