Microsoft Security Fundamentals: Network Security

Individuals interested in the Microsoft Security Fundamentals: MTA exam (98-367)


Expected Duration
79 minutes

One of the building blocks of successful IT security practices is a fundamental understanding of network security. This course introduces key concepts about dedicated firewalls and methods including packet filtering, circuit-level, application-level, and stateful multilevel firewalls. This course also covers types of inspection, and stateful v. stateless inspection. Finally, this course covers best practices for Network Access Protection, network isolation methods, and protocol security concepts including common network attack methods. This course is one of a series in the Skillsoft learning path that covers the objectives for the Microsoft Security Fundamentals: MTA 98-367 exam.


Dedicated Firewalls

  • start the course
  • identify the purpose of firewalls
  • recognize characteristics of packet filtering firewalls
  • recognize characteristics of circuit-level firewalls
  • recognize characteristics of application-level firewalls
  • recognize characteristics of stateful multilevel firewalls
  • recognize characteristics of software firewalls
  • identify an appropriate firewall for network protection
  • distinguish between stateful and stateless inspection
  • identify the most appropriate inspection type to use

Network Access Protection

  • identify the purpose of NAP
  • identify NAP requirements

Network Isolation

  • identify characteristics of VLANs
  • distinguish between ways to assign hosts to VLANs
  • identify characteristics of routing
  • distinguish between the two main types of IDS/IPS
  • identify characteristics of honeypots
  • identify characteristics of DMZs
  • identify characteristics of NAT
  • identify characteristics of VPNs
  • identify characteristics of IPSec
  • identify characteristics of server and domain isolation

Protocol Security

  • identify characteristics of tunneling
  • identify characteristics of DNSSec
  • identify characteristics of protocol spoofing
  • identify characteristics of utility network sniffing
  • distinguish between common attack methods
  • identify characteristics of common attack methods

Practice: Securing the Network

  • identify best practices when using dedicated firewalls, NAP, network isolation, and protocol security to secure the network





Multi-license discounts available for Annual and Monthly subscriptions.