Network Security Fundamentals Learning Path

Learn the fundamentals of networking and how to secure networks.

5 hours, 13 minutes

Quick facts

About this learning path

  • courses

    100% online

  • Duration

    5 hours, 13 minutes

  • Assessment


About Network Security Fundamentals

Throughout this learning path, we will be covering the fundamentals of wireless network security, firewalls and IDS/IPSes, VPNs and how users access your network remotely, endpoint security, preventing and mitigating network attacks, and some best practices related to securing your network. This learning path is designed to get you up to speed on how to secure your organization's network as quickly as possible.



Network Security Fundamentals Skill Assessment

Assessment - 62 questions

Networking Fundamentals

Course - 01:41:00

In this course, we will be covering the OSI Model and TCP/IP Model, two conceptual models that describe how networking functions in our world today. After that, we will cover AAA services — including authentication, authorization and auditing/accounting — discuss secure network protocols and engage in an overview of IPv4 and IPv6.
Wireless Networks and Security

Course - 00:53:00

In this course, we will briefly overview the fundamentals of Wi-Fi networking, including the 802.11 standard set by IEEE. We will then discuss Wi-Fi security, including how to best lock down wireless access points. After covering Wi-Fi, we will move on to cellular networks and securing mobile devices. Then we will go through real-world network attacks and mitigating those attacks.
Firewalls and IDS/IPS

Course - 00:29:00

In this course, we will be overviewing different types of firewalls and IDS/IPSes, including an in-depth look at the history of firewalls, deployment of firewalls and the features of next-generation firewalls. We also discuss firewalls as a defense-in-depth strategy, not as a device to set and forget. After that, we discuss the difference between IDSes and IPSes and some of the leading network security devices being used in the industry today.
VPNs and Remote Access Technologies

Course - 00:25:00

Our focus in this course will be on VPNs and remote access, including the different types of VPN technologies (including TLS and IPSec/L2TP) and a discussion of how VPN tunneling functions. We will also be discussing different methods of allowing users to remotely access your organization’s network as well as some security controls that you should apply to mitigate potential risk.
Endpoint Security

Course - 00:32:00

This course will help you understand additional information about the security of your organization’s endpoints with a focus on locking down individual devices in the network. A general overview of endpoint protection is the first section of the course, after which we discuss anti-malware software as well as host-based IDS/IPSes. We also discuss endpoint hardening and using MDM (mobile device management) systems to lock down your organization’s endpoints.
Preventing and Mitigating Network Attacks

Course - 00:20:00

To begin this course, we talk about some different real-world attacks that your organization might experience. We briefly outline how each attack works as well as some potential methods that you can use to mitigate these risks. We also discuss both vulnerability testing and penetration testing as methods of ensuring that you test your network for proper security controls. Only through this method of offensive security using techniques like ethical hacking can you truly provide for your network’s security.
Network Security Principles

Course - 00:42:00

To begin the course, we discuss the principle of defense in depth (or layered defense) as a primary means to establishing IT security. We then cover proper procedures for backing up data and ensuring that the integrity of your data is protected. After this, we discuss voice security and proper methods to lock down your VoIP or PBX infrastructure. The importance of securing confidential business email is the next topic, where we discuss some of the email security methods that are used in organizations today. We finish the course with a discussion of the philosophy of “zero-trust networking” as well as some best practices related to network security in your organization.

Meet the author

Kevin Carter

Kevin Carter is the CEO and Founder of Mesh Networking LLC. Kevin has 15 years of experience in the finance and IT industries with an emphasis in IT and operations management. In the past, he has supervised day-to-day IT operations for multiple hedge funds with excess of $1 billion AUM, helping to implement and support IT infrastructure, trade operations, order management systems and market data applications.

From 2010-2016, Kevin was the Chief Technology Officer at Dialectic Capital Management, LP. Before he joined Dialectic, he was a field technician and CSA/SSA Manager at Richard Fleischman & Associates, a hedge fund IT consulting firm. Kevin is currently certified by (ISC)² (CISSP), Microsoft (MCSA, MCITP, MCDST, MCP), SolarWinds (SCP), VMware (VCA-DCV, VCA-Cloud, VCA-WM), Rackspace (CloudU), Bloomberg (BTTC, BESS), and Apple (ACA).

The details

Learning path insights

How to claim CPEs

Should you complete this learning path, you’ll be able to download a certificate of completion. Use this to claim your CPEs or CPUs.

Associated NICE Work Roles

All Infosec training maps directly to the NICE Workforce Framework for Cybersecurity to guide you from beginner to expert across 52 Work Roles.

  • All-Source Analyst
  • Mission Assessment Specialist
  • Exploitation Analyst

No software. No set up. Unlimited access.

Skip the server racks and spin up a realistic environment with one click. Infosec Skills cyber ranges require no additional software, hardware or server space so your team can spend less time configuring environments and more time learning. Unlimited cyber range access is included in every Infosec Skills subscription so your team can skill up however they learn best.

Unlock 7 days of free training

  • 1,400+ hands-on courses and labs
  • Certification practice exams
  • Skill assessments

Plans & pricing

Infosec Skills Personal

$299 / year

  • 190+ role-guided learning paths (e.g., Ethical Hacking, Threat Hunting)
  • 100s of hands-on labs in cloud-hosted cyber ranges
  • Custom certification practice exams (e.g., CISSP, Security+)
  • Skill assessments
  • Infosec peer community support

Infosec Skills Teams

$799 per license / year

  • Team administration and reporting
  • Dedicated client success manager
  • Single sign-on (SSO)
    Easily authenticate and manage your learners by connecting to any identity provider that supports the SAML 2.0 standard.
  • Integrations via API
    Retrieve training performance and engagement metrics and integrate learner data into your existing LMS or HRS.
  • 190+ role-guided learning paths and assessments (e.g., Incident Response)
  • 100s of hands-on labs in cloud-hosted cyber ranges
  • Create and assign custom learning paths
  • Custom certification practice exams (e.g., CISSP, CISA)
  • Optional upgrade: Guarantee team certification with live boot camps

Learn about scholarships and financing with

Affirm logo