Course Details

Previous Page

Microsoft Security Fundamentals: Network Security

Target Audience
Expected Duration
Lesson Objectives
Course Number

One of the building blocks of successful IT security practices is a fundamental understanding of network security. This course introduces key concepts about dedicated firewalls and methods including packet filtering, circuit-level, application-level, and stateful multilevel firewalls. This course also covers types of inspection, and stateful v. stateless inspection. Finally, this course covers best practices for Network Access Protection, network isolation methods, and protocol security concepts including common network attack methods. This course is one of a series in the Skillsoft learning path that covers the objectives for the Microsoft Security Fundamentals: MTA 98-367 exam.

Target Audience
Individuals interested in the Microsoft Security Fundamentals: MTA exam (98-367)


Expected Duration (hours)

Lesson Objectives

Microsoft Security Fundamentals: Network Security

  • start the course
  • identify the purpose of firewalls
  • recognize characteristics of packet filtering firewalls
  • recognize characteristics of circuit-level firewalls
  • recognize characteristics of application-level firewalls
  • recognize characteristics of stateful multilevel firewalls
  • recognize characteristics of software firewalls
  • identify an appropriate firewall for network protection
  • distinguish between stateful and stateless inspection
  • identify the most appropriate inspection type to use
  • identify the purpose of NAP
  • identify NAP requirements
  • identify characteristics of VLANs
  • distinguish between ways to assign hosts to VLANs
  • identify characteristics of routing
  • distinguish between the two main types of IDS/IPS
  • identify characteristics of honeypots
  • identify characteristics of DMZs
  • identify characteristics of NAT
  • identify characteristics of VPNs
  • identify characteristics of IPSec
  • identify characteristics of server and domain isolation
  • identify characteristics of tunneling
  • identify characteristics of DNSSec
  • identify characteristics of protocol spoofing
  • identify characteristics of utility network sniffing
  • distinguish between common attack methods
  • identify characteristics of common attack methods
  • identify best practices when using dedicated firewalls, NAP, network isolation, and protocol security to secure the network
  • Course Number: