Skip to content

Commit 32729f6

Browse files
committed
AB#1037387: Fundamentals of network security
1 parent a686dfc commit 32729f6

12 files changed

+46
-46
lines changed

learn-pr/azure/network-fundamentals-2/1-introduction.yml

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -4,9 +4,9 @@ title: Introduction
44
metadata:
55
title: Introduction
66
description: Learn the fundamentals of computer networking security. You'll cover the core difference between authentication and authorization. You'll also explore monitoring of network access and traffic usage. Finally, you'll explore network security and how firewalls can be used to protect your network and your organization's assets and resources.
7-
ms.date: 07/13/2023
8-
author: cryophobia
9-
ms.author: chrvaw
7+
ms.date: 03/27/2025
8+
author: rmcmurray
9+
ms.author: robmcm
1010
ms.topic: unit
1111
durationInMinutes: 2
1212
content: |

learn-pr/azure/network-fundamentals-2/2-basic-client-server.yml

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -2,11 +2,11 @@
22
uid: learn.azure.network-fundamentals-2.basic-client-server
33
title: An introduction to network client and server technology
44
metadata:
5-
title: An introduction to network client and server technology
5+
title: An Introduction to Network Client and Server Technology
66
description: An introduction to network-based client technology and the various server options available.
7-
ms.date: 07/13/2023
8-
author: cryophobia
9-
ms.author: chrvaw
7+
ms.date: 03/27/2025
8+
author: rmcmurray
9+
ms.author: robmcm
1010
ms.topic: unit
1111
durationInMinutes: 7
1212
content: |
@@ -34,6 +34,6 @@ quiz:
3434
- content: "Hosts all your web and non-web apps in one place, so they can be accessed across the network."
3535
isCorrect: true
3636
explanation: "An application server provides application access to a client."
37-
- content: "Hosts all your web apps and lets users in the network run them and use them in their browser."
37+
- content: "An application server hosts all your web apps and lets users in the network run them and use them in their browser."
3838
isCorrect: false
3939
explanation: "An application server provides application access to a client (both web apps and custom software)."

learn-pr/azure/network-fundamentals-2/3-authentication-authorization.yml

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -2,11 +2,11 @@
22
uid: learn.azure.network-fundamentals-2.authentication-authorization
33
title: Use authentication and authorization in your network
44
metadata:
5-
title: Use authentication and authorization in your network
5+
title: Use Authentication and Authorization in your Network
66
description: Understand how authentication and authorization can help protect your network.
7-
ms.date: 07/13/2023
8-
author: cryophobia
9-
ms.author: chrvaw
7+
ms.date: 03/27/2025
8+
author: rmcmurray
9+
ms.author: robmcm
1010
ms.topic: unit
1111
durationInMinutes: 9
1212
content: |

learn-pr/azure/network-fundamentals-2/4-firewalls-network-security.yml

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -2,11 +2,11 @@
22
uid: learn.azure.network-fundamentals-2.firewalls-network-security
33
title: Understand firewalls and network security
44
metadata:
5-
title: Understand firewalls and network security
5+
title: Understand Firewalls and Network Security
66
description: Understanding what firewalls are and how to use them, and understanding network security.
7-
ms.date: 07/13/2023
8-
author: cryophobia
9-
ms.author: chrvaw
7+
ms.date: 03/27/2025
8+
author: rmcmurray
9+
ms.author: robmcm
1010
ms.topic: unit
1111
durationInMinutes: 10
1212
content: |
@@ -31,7 +31,7 @@ quiz:
3131
- content: Packet filtering firewall.
3232
isCorrect: false
3333
explanation: This type of firewall checks your packets. Use a proxy server to hide details about your clients from the internet.
34-
- content: Circuit-level firewall.
34+
- content: Circuit-level firewall.
3535
isCorrect: false
3636
explanation: This type of firewall helps you check whether TCP and UDP connections are valid. Use a proxy server to hide details about your clients from the internet.
3737
- content: Proxy server firewall.

learn-pr/azure/network-fundamentals-2/5-network-monitoring.yml

Lines changed: 7 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -2,11 +2,11 @@
22
uid: learn.azure.network-fundamentals-2.network-monitoring
33
title: Network monitoring
44
metadata:
5-
title: Use monitoring in your network
5+
title: Use Monitoring in your Network
66
description: Understand how to use monitoring to protect your network.
7-
ms.date: 07/13/2023
8-
author: cryophobia
9-
ms.author: chrvaw
7+
ms.date: 03/27/2025
8+
author: rmcmurray
9+
ms.author: robmcm
1010
ms.topic: unit
1111
durationInMinutes: 7
1212
content: |
@@ -16,13 +16,13 @@ quiz:
1616
questions:
1717
- content: You need to query log data for applications across your network in Azure. Which tool do you use?
1818
choices:
19-
- content: You use Syslog to query the log data that has been collected.
19+
- content: Use Syslog to query the log data that has been collected.
2020
isCorrect: false
2121
explanation: Syslog is used for event logging. Use Log Analytics.
22-
- content: You use Log Analytics to query the data that has been collected.
22+
- content: Use Log Analytics to query the data that has been collected.
2323
isCorrect: true
2424
explanation: Log Analytics can help you run complex queries over your log data.
25-
- content: You use an agent to run queries on the data that has been collected.
25+
- content: Use an agent to run queries on the data that has been collected.
2626
isCorrect: false
2727
explanation: An agent is used to collect information from a resource such as a virtual machine. Use Log Analytics to run queries.
2828

learn-pr/azure/network-fundamentals-2/6-summary.yml

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -4,9 +4,9 @@ title: Summary
44
metadata:
55
title: Summary
66
description: Review what you've learned about network security fundamentals.
7-
ms.date: 07/13/2023
8-
author: cryophobia
9-
ms.author: chrvaw
7+
ms.date: 03/27/2025
8+
author: rmcmurray
9+
ms.author: robmcm
1010
ms.topic: unit
1111
durationInMinutes: 1
1212
content: |

learn-pr/azure/network-fundamentals-2/includes/1-introduction.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,4 +1,4 @@
1-
The decision to move to the cloud and taking on a role as an Azure developer, solution architect, or administrator requires knowledge of the foundations of networking. Networks are made up of various network devices. However, there are other aspects to keep in mind, such as how to share resources on a network in a secure way and how to ensure that only authorized users have access to these resources.
1+
Deciding to move to the cloud and taking on a role as an Azure developer, solution architect, or administrator requires knowledge of the foundations of networking. Networks are made up of various network devices. However, there are other aspects to keep in mind, such as how to share resources on a network in a secure way and how to ensure that only authorized users have access to these resources.
22

33
In this module, we'll explore the fundamentals of networking security. We'll look at how to share resources in a client-server network and explain the core difference between authentication and authorization. Next, we'll explore how to use firewalls to help protect your network and discuss how to monitor network access and traffic usage. Finally, we'll see how each aspect is addressed in Azure.
44

learn-pr/azure/network-fundamentals-2/includes/2-basic-client-server.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,4 +1,4 @@
1-
The first thing you need to understand about the composition of a network is how it's built. Servers are the workhorses of a network. Connections are achieved throughout a network through a mix of hubs, switches, and routers. This knowledge applies whether it's your own organization's network, or more extensive networks like the web. All networks are built on the same principles.
1+
The first thing to understand about a network's composition is how it's built. Servers are the workhorses of a network. Connections are achieved throughout a network through a mix of hubs, switches, and routers. This knowledge applies whether it's your own organization's network or more extensive networks like the web. All networks are built on the same principles.
22

33
In this unit, you'll gain a better understanding of the various client options. You'll also explore the various server models and options available.
44

@@ -69,7 +69,7 @@ There are several advantages that a client-server provides an organization. Thes
6969

7070
As with any technology, there are also disadvantages that you should consider when you use a client-server network architecture:
7171

72-
- The failure of the server can block users from accessing resources. Because the resources are now centralized, any access disruption will affect all users.
72+
- Server failure can block users from accessing resources. Because the resources are now centralized, any access disruption will affect all users.
7373
- Setting up a client-server architecture can be expensive, because it requires dedicated hardware and software.
7474
- Running and maintaining a network requires IT professionals with dedicated technical knowledge.
7575
- Multiple requests for the same operation affect the performance of the server; for example, in a denial-of-service attack.

learn-pr/azure/network-fundamentals-2/includes/3-authentication-authorization.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -70,7 +70,7 @@ In Kerberos, principals get tickets that grant them service tickets from the KDC
7070

7171
TLS and the older SSL are both protocols for encrypting information sent over the internet. Because the data is encrypted, attackers can't view what is sent through TLS/SSL.
7272

73-
You'll often see a padlock icon on your browser when a site makes use of a secure connection. This symbol means the site is using a secure TLS/SSL session with the browser. TLS/SSL is also used for file transfers, voice-over-IP, and email.
73+
You'll often see a padlock icon on your browser when a site makes use of a secure connection. This symbol means the site is using a secure TLS/SSL session with the browser. TLS/SSL is also used for file transfers, voice over IP, and email.
7474

7575
SSL is the predecessor of TLS, and is deprecated. We'll often find the two terms used interchangeably. The protocols work as follows:
7676

@@ -86,7 +86,7 @@ SSL is the predecessor of TLS, and is deprecated. We'll often find the two terms
8686

8787
1. The client sends a "finished" message that's encrypted with the shared key.
8888

89-
1. The server sends its own "finished" message that is encrypted with the shared key. From this point, the client and the server can continue to exchange messages that are encrypted with the shared encrypted key.
89+
1. The server sends its own "finished" message that's encrypted with the shared key. From this point, the client and the server can continue to exchange messages that are encrypted with the shared key.
9090

9191
## Network authorization
9292

learn-pr/azure/network-fundamentals-2/includes/4-firewalls-network-security.md

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -23,7 +23,7 @@ You can use antimalware and antivirus tools to monitor and remedy malware. These
2323

2424
### Application security
2525

26-
Attackers can compromise applications, whether they're yours or owned by a third party. The software may inadvertently contain security vulnerabilities that an attacker might use to access devices and network resources. If an application is developed in-house, you'll need to actively find and fix vulnerabilities that attackers could abuse. One solution is to test your application during its development lifecycle and implement whatever changes are needed to fix a potential vulnerability. If you're dealing with an application developed elsewhere, it's a good practice to apply updates as soon as they're available.
26+
Attackers can compromise applications, whether they're yours or owned by a third party. The software might inadvertently contain security vulnerabilities that an attacker could use to access devices and network resources. If an application is developed in-house, you'll need to actively find and fix vulnerabilities that attackers could abuse. One solution is to test your application during its development lifecycle and implement whatever changes are needed to fix a potential vulnerability. If you're dealing with an application developed elsewhere, it's a good practice to apply updates as soon as they're available.
2727

2828
### Behavioral analytics
2929

@@ -53,7 +53,7 @@ A virtual private network (VPN) can establish an encrypted connection from one n
5353

5454
### Web security
5555

56-
You can employ tools that secure how your people use the web. For example, you can use a web filter to prevent users from accessing certain types of sites that have been red flagged. These web-security tools also allow you to set up policies that help you decide how you want to handle different types of web requests in your network.
56+
You can employ tools that secure how your people use the web. For example, you can use a web filter to prevent users from accessing certain types of sites that have been red flagged. These web security tools also allow you to set up policies that help you decide how you want to handle different types of web requests in your network.
5757

5858
### Wireless security
5959

@@ -103,7 +103,7 @@ Firewalls can perform several different functions across your network:
103103

104104
- **Application-layer firewalls** can be a physical appliance or software-based, like a plug-in or a filter. These types of firewalls target your applications. For example, they could affect how requests for HTTP connections are inspected across each of your applications.
105105

106-
- **Packet filtering firewalls** scrutinize each data packet as it travels through your network. Based on rules you configure, they decide whether to block the specific packet or not.
106+
- **Packet filtering firewalls** scrutinize each data packet as it travels through your network. they decide whether to block the specific packet or not based on rules you configure.
107107

108108
- **Circuit-level firewalls** check whether TCP and UDP connections across your network are valid before data is exchanged. For example, this type of firewall might first check whether the source and destination addresses, the user, the time, and date meet certain defined rules. When these checks pass and a session starts, data is exchanged between parties without further scrutiny.
109109

@@ -121,7 +121,7 @@ Firewalls can perform several different functions across your network:
121121

122122
Firewalls help protect your network from the outside world. If you don't have a firewall set up:
123123

124-
- An attacker could employ malware and take advantage of your bandwidth to use it for themselves.
124+
- Attackers could employ malware and take advantage of your bandwidth to use it for themselves.
125125
- Sensitive and private information about employees and clients could be stolen.
126126
- Your resources, devices, and the entire network could be held for ransom.
127127

@@ -169,6 +169,6 @@ Configure **Azure virtual network service endpoints** so that critical Azure ser
169169

170170
**Disable SSH/RDP** access whenever possible. These protocols are used to manage your virtual machines from a remote location, but attackers could attempt brute-force attacks if no proper protections are in place. Create a point-to-site VPN connection before enabling SSH/RDP for remote management.
171171

172-
Use **load balancing** to improve the performance and availability of your network. When you use a load balancer, you distribute network traffic across the machines in your network. For example, if you have a couple of web servers that look after a website as part of your network, you can configure a load balancer to distribute the traffic between them. This way, you improve the performance and availability of the website.
172+
Use **load balancing** to improve your network's performance and availability. When you use a load balancer, you distribute network traffic across the machines in your network. For example, if you have a couple of web servers that look after a website as part of your network, you can configure a load balancer to distribute the traffic between them. This way, you improve the performance and availability of the website.
173173

174-
A distributed denial-of-service (DDoS) attack overloads resources or services across your network so that they become unusable or inaccessible. **Azure DDoS Protection** provides automatic traffic monitoring and mitigating for DDoS attacks. You can interact with the service and enable additional features, like having access to DDoS experts, by upgrading to the Standard tier.
174+
A distributed denial-of-service (DDoS) attack overloads resources or services across your network so that they become unusable or inaccessible. **Azure DDoS Protection** provides automatic traffic monitoring and mitigation for DDoS attacks. You can interact with the service and enable additional features, like having access to DDoS experts, by upgrading to the Standard tier.

0 commit comments

Comments
 (0)