Network Security Principles

In this course, we go over some general concepts related to network security as well as how to establish these principles through policies and procedures. We cover the concepts of defense in depth, backing up data, securing both voice and email, zero-trust networking policies and establishing best practices for IT security within your organization.

6 videos  //  42 minutes of training

Free training week — 1,400+ on-demand courses and hands-on labs

Course description

To begin the course, we discuss the principle of defense in depth (or layered defense) as a primary means to establishing IT security. We then cover proper procedures for backing up data and ensuring that the integrity of your data is protected. After this, we discuss voice security and proper methods to lock down your VoIP or PBX infrastructure. The importance of securing confidential business email is the next topic, where we discuss some of the email security methods that are used in organizations today. We finish the course with a discussion of the philosophy of “zero-trust networking” as well as some best practices related to network security in your organization.

Course syllabus

Defense in DepthDuration: 6:29

Data Integrity and BackupsDuration: 6:11

VoiceDuration: 7:43

Email SecurityDuration: 6:45

Zero-Trust NetworkingDuration: 3:31

Due Diligence and Best PracticesDuration: 11:38

Meet the author

Kevin Carter

LinkedIn

Kevin Carter is the CEO and Founder of Mesh Networking LLC. Kevin has 15 years of experience in the finance and IT industries with an emphasis in IT and operations management. In the past, he has supervised day-to-day IT operations for multiple hedge funds with excess of $1 billion AUM, helping to implement and support IT infrastructure, trade operations, order management systems and market data applications.

From 2010-2016, Kevin was the Chief Technology Officer at Dialectic Capital Management, LP. Before he joined Dialectic, he was a field technician and CSA/SSA Manager at Richard Fleischman & Associates, a hedge fund IT consulting firm. Kevin is currently certified by (ISC)² (CISSP), Microsoft (MCSA, MCITP, MCDST, MCP), SolarWinds (SCP), VMware (VCA-DCV, VCA-Cloud, VCA-WM), Rackspace (CloudU), Bloomberg (BTTC, BESS), and Apple (ACA).

Plans & pricing

Infosec Skills Personal

  • 190+ role-guided learning paths (e.g., Ethical Hacking, Threat Hunting)
  • 100s of hands-on labs in cloud-hosted cyber ranges
  • Custom certification practice exams (e.g., CISSP, Security+)
  • Skill assessments
  • Infosec peer community support

Infosec Skills Teams

$799 per license / year

Book a Meeting
  • Team administration and reporting
  • Dedicated client success manager
  • Single sign-on (SSO)
    Easily authenticate and manage your learners by connecting to any identity provider that supports the SAML 2.0 standard.
  • Integrations via API
    Retrieve training performance and engagement metrics and integrate learner data into your existing LMS or HRS.
  • 190+ role-guided learning paths and assessments (e.g., Incident Response)
  • 100s of hands-on labs in cloud-hosted cyber ranges
  • Create and assign custom learning paths
  • Custom certification practice exams (e.g., CISSP, CISA)
  • Optional upgrade: Guarantee team certification with live boot camps

Award-winning training that you can trust

IDC MarketScape Leader: U.S. IT Training

IDC MarketScape Leader: U.S. IT Training

Infosec Skills

eLearning Content

eLearning Content

Infosec Skills

Best Product - Cybersecurity Training for Infosec Professionals

Best Product - Cybersecurity Training for Infosec Professionals

Infosec Skills

Security Education & Platform

Security Education & Platform

Infosec Skills

Ranked #52 in Top 100 Global Software Sellers

Ranked #52 in Top 100 Global Software Sellers

Infosec