Course

Network Security Principles

In this course, we go over some general concepts related to network security as well as how to establish these principles through policies and procedures. We cover the concepts of defense in depth, backing up data, securing both voice and email, zero-trust networking policies and establishing best practices for IT security within your organization.

Course description

To begin the course, we discuss the principle of defense in depth (or layered defense) as a primary means to establishing IT security. We then cover proper procedures for backing up data and ensuring that the integrity of your data is protected. After this, we discuss voice security and proper methods to lock down your VoIP or PBX infrastructure. The importance of securing confidential business email is the next topic, where we discuss some of the email security methods that are used in organizations today. We finish the course with a discussion of the philosophy of “zero-trust networking” as well as some best practices related to network security in your organization.

Syllabus

Defense in Depth

Video — 00:06:29

Data Integrity and Backups

Video — 00:06:11

Voice

Video — 00:07:43

Email Security

Video — 00:06:45

Zero-Trust Networking

Video — 00:03:31

Due Diligence and Best Practices

Video — 00:11:38

Meet the author

Kevin Carter is the CEO and Founder of Mesh Networking LLC. Kevin has 15 years of experience in the finance and IT industries with an emphasis in IT and operations management. In the past, he has supervised day-to-day IT operations for multiple hedge funds with excess of $1 billion AUM, helping to implement and support IT infrastructure, trade operations, order management systems and market data applications.

From 2010-2016, Kevin was the Chief Technology Officer at Dialectic Capital Management, LP. Before he joined Dialectic, he was a field technician and CSA/SSA Manager at Richard Fleischman & Associates, a hedge fund IT consulting firm. Kevin is currently certified by (ISC)² (CISSP), Microsoft (MCSA, MCITP, MCDST, MCP), SolarWinds (SCP), VMware (VCA-DCV, VCA-Cloud, VCA-WM), Rackspace (CloudU), Bloomberg (BTTC, BESS), and Apple (ACA).

Unlock 7 days of free training

  • 1,400+ hands-on courses and labs
  • Certification practice exams
  • Skill assessments

Associated NICE Work Roles

All Infosec training maps directly to the NICE Workforce Framework for Cybersecurity to guide you from beginner to expert across 52 Work Roles.

  • Cyber Operator
  • Law Enforcement / Counterintelligence Forensics Analyst
  • Cyber Defense Forensics Analyst

You're in good company

CY

We use Infosec Skills to provide continuous training to our technicians and to prepare them for various certifications. Infosec Skills allows us to create personalized training programs that focus on each of our technicians’ particular roles and see their progress as they take courses. We also, recommend it to clients to make their IT support teams better.

Caleb Yankus

DS

This has been utilized to bridge the skills gap across our cyber team and to aid them as they prepare for their various certifications. It also has provided a nice learning foundation for our various cyber team members to utilize as we continue to find ways for cross-utilization with operations while minimizing the downtime needed to ensure everyone’s knowledge is the same.

Daniel Simpson

IS

We use Infosec Skills to provide base level knowledge for employees. We also use the services to provide in depth learning for employees as they encounter new technologies. If an employee is is assigned to a new project, we can rely on Infosec Skills to provide a rapid concentrated learning environment. This rapid concentrated learning positions our employees for success.

Infosec Skills Teams client

Plans & pricing

  • Infosec Skills Personal

    $299 / year

    • 190+ role-guided learning paths (e.g., Ethical Hacking, Threat Hunting)
    • 100s of hands-on labs in cloud-hosted cyber ranges
    • Custom certification practice exams (e.g., CISSP, Security+)
    • Skill assessments
    • Infosec peer community support
  • Infosec Skills Teams

    $799 per license / year

    • Team administration and reporting
    • Dedicated client success manager
    • Single sign-on (SSO)
      Easily authenticate and manage your learners by connecting to any identity provider that supports the SAML 2.0 standard.
    • Integrations via API
      Retrieve training performance and engagement metrics and integrate learner data into your existing LMS or HRS.
    • 190+ role-guided learning paths and assessments (e.g., Incident Response)
    • 100s of hands-on labs in cloud-hosted cyber ranges
    • Create and assign custom learning paths
    • Custom certification practice exams (e.g., CISSP, CISA)
    • Optional upgrade: Guarantee team certification with live boot camps

Award-winning training that you can trust

Comprehensive Cybersecurity Training - Infosec Skills
Cybersecurity Education and Training Gold Award - Infosec IQ
Top Rated Award - Infosec Skills
Technical Skills Development - Small Business, Mid-Market
Top 20 Online Learning Library