You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: learn-pr/azure/network-fundamentals-2/1-introduction.yml
+3-3Lines changed: 3 additions & 3 deletions
Original file line number
Diff line number
Diff line change
@@ -4,9 +4,9 @@ title: Introduction
4
4
metadata:
5
5
title: Introduction
6
6
description: Learn the fundamentals of computer networking security. You'll cover the core difference between authentication and authorization. You'll also explore monitoring of network access and traffic usage. Finally, you'll explore network security and how firewalls can be used to protect your network and your organization's assets and resources.
description: Understanding what firewalls are and how to use them, and understanding network security.
7
-
ms.date: 07/13/2023
8
-
author: cryophobia
9
-
ms.author: chrvaw
7
+
ms.date: 03/27/2025
8
+
author: rmcmurray
9
+
ms.author: robmcm
10
10
ms.topic: unit
11
11
durationInMinutes: 10
12
12
content: |
@@ -31,7 +31,7 @@ quiz:
31
31
- content: Packet filtering firewall.
32
32
isCorrect: false
33
33
explanation: This type of firewall checks your packets. Use a proxy server to hide details about your clients from the internet.
34
-
- content: Circuit-level firewall.
34
+
- content: Circuit-level firewall.
35
35
isCorrect: false
36
36
explanation: This type of firewall helps you check whether TCP and UDP connections are valid. Use a proxy server to hide details about your clients from the internet.
Copy file name to clipboardExpand all lines: learn-pr/azure/network-fundamentals-2/includes/1-introduction.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,4 +1,4 @@
1
-
The decision to move to the cloud and taking on a role as an Azure developer, solution architect, or administrator requires knowledge of the foundations of networking. Networks are made up of various network devices. However, there are other aspects to keep in mind, such as how to share resources on a network in a secure way and how to ensure that only authorized users have access to these resources.
1
+
Deciding to move to the cloud and taking on a role as an Azure developer, solution architect, or administrator requires knowledge of the foundations of networking. Networks are made up of various network devices. However, there are other aspects to keep in mind, such as how to share resources on a network in a secure way and how to ensure that only authorized users have access to these resources.
2
2
3
3
In this module, we'll explore the fundamentals of networking security. We'll look at how to share resources in a client-server network and explain the core difference between authentication and authorization. Next, we'll explore how to use firewalls to help protect your network and discuss how to monitor network access and traffic usage. Finally, we'll see how each aspect is addressed in Azure.
Copy file name to clipboardExpand all lines: learn-pr/azure/network-fundamentals-2/includes/2-basic-client-server.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,4 +1,4 @@
1
-
The first thing you need to understand about the composition of a networkis how it's built. Servers are the workhorses of a network. Connections are achieved throughout a network through a mix of hubs, switches, and routers. This knowledge applies whether it's your own organization's network, or more extensive networks like the web. All networks are built on the same principles.
1
+
The first thing to understand about a network's composition is how it's built. Servers are the workhorses of a network. Connections are achieved throughout a network through a mix of hubs, switches, and routers. This knowledge applies whether it's your own organization's network or more extensive networks like the web. All networks are built on the same principles.
2
2
3
3
In this unit, you'll gain a better understanding of the various client options. You'll also explore the various server models and options available.
4
4
@@ -69,7 +69,7 @@ There are several advantages that a client-server provides an organization. Thes
69
69
70
70
As with any technology, there are also disadvantages that you should consider when you use a client-server network architecture:
71
71
72
-
-The failure of the server can block users from accessing resources. Because the resources are now centralized, any access disruption will affect all users.
72
+
-Server failure can block users from accessing resources. Because the resources are now centralized, any access disruption will affect all users.
73
73
- Setting up a client-server architecture can be expensive, because it requires dedicated hardware and software.
74
74
- Running and maintaining a network requires IT professionals with dedicated technical knowledge.
75
75
- Multiple requests for the same operation affect the performance of the server; for example, in a denial-of-service attack.
Copy file name to clipboardExpand all lines: learn-pr/azure/network-fundamentals-2/includes/3-authentication-authorization.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -70,7 +70,7 @@ In Kerberos, principals get tickets that grant them service tickets from the KDC
70
70
71
71
TLS and the older SSL are both protocols for encrypting information sent over the internet. Because the data is encrypted, attackers can't view what is sent through TLS/SSL.
72
72
73
-
You'll often see a padlock icon on your browser when a site makes use of a secure connection. This symbol means the site is using a secure TLS/SSL session with the browser. TLS/SSL is also used for file transfers, voice-over-IP, and email.
73
+
You'll often see a padlock icon on your browser when a site makes use of a secure connection. This symbol means the site is using a secure TLS/SSL session with the browser. TLS/SSL is also used for file transfers, voiceoverIP, and email.
74
74
75
75
SSL is the predecessor of TLS, and is deprecated. We'll often find the two terms used interchangeably. The protocols work as follows:
76
76
@@ -86,7 +86,7 @@ SSL is the predecessor of TLS, and is deprecated. We'll often find the two terms
86
86
87
87
1. The client sends a "finished" message that's encrypted with the shared key.
88
88
89
-
1. The server sends its own "finished" message that is encrypted with the shared key. From this point, the client and the server can continue to exchange messages that are encrypted with the shared encrypted key.
89
+
1. The server sends its own "finished" message that's encrypted with the shared key. From this point, the client and the server can continue to exchange messages that are encrypted with the shared key.
Copy file name to clipboardExpand all lines: learn-pr/azure/network-fundamentals-2/includes/4-firewalls-network-security.md
+9-9Lines changed: 9 additions & 9 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -10,20 +10,20 @@ You need robust security to diagnose and prevent suspicious events, attacks, and
10
10
11
11
You can use access control to scrutinize every user and client to determine whether they have permission to access your network or its resources. You implement access control by configuring security policies that ensure the user has the right level of permissions assigned to do specific actions on your network. For example, you might want to deny read access for some resources when the user is connecting from outside your on-premises location.
12
12
13
-
### Antimalware tools
13
+
### Anti-malware tools
14
14
15
-
Antimalware tools protect your network from malicious software (malware). Malware comes in different forms, including:
15
+
Anti-malware tools protect your network from malicious software (malware). Malware comes in different forms, including:
16
16
17
17
- Ransomware
18
18
- Viruses
19
19
- Spyware
20
20
- Trojans
21
21
22
-
You can use antimalware and antivirus tools to monitor and remedy malware. These tools can detect anomalies in your files, take actions to remove malicious pieces of code, and repair affected resources and devices on your network.
22
+
You can use anti-malware and antivirus tools to monitor and remedy malware. These tools can detect anomalies in your files, take actions to remove malicious pieces of code, and repair affected resources and devices on your network.
23
23
24
24
### Application security
25
25
26
-
Attackers can compromise applications, whether they're yours or owned by a third party. The software may inadvertently contain security vulnerabilities that an attacker might use to access devices and network resources. If an application is developed in-house, you'll need to actively find and fix vulnerabilities that attackers could abuse. One solution is to test your application during its development lifecycle and implement whatever changes are needed to fix a potential vulnerability. If you're dealing with an application developed elsewhere, it's a good practice to apply updates as soon as they're available.
26
+
Attackers can compromise applications, whether they're yours or owned by a third party. The software might inadvertently contain security vulnerabilities that an attacker could use to access devices and network resources. If an application is developed in-house, you'll need to actively find and fix vulnerabilities that attackers could abuse. One solution is to test your application during its development lifecycle and implement whatever changes are needed to fix a potential vulnerability. If you're dealing with an application developed elsewhere, it's a good practice to apply updates as soon as they're available.
27
27
28
28
### Behavioral analytics
29
29
@@ -53,7 +53,7 @@ A virtual private network (VPN) can establish an encrypted connection from one n
53
53
54
54
### Web security
55
55
56
-
You can employ tools that secure how your people use the web. For example, you can use a web filter to prevent users from accessing certain types of sites that have been red flagged. These web-security tools also allow you to set up policies that help you decide how you want to handle different types of web requests in your network.
56
+
You can employ tools that secure how your people use the web. For example, you can use a web filter to prevent users from accessing certain types of sites that have been red flagged. These websecurity tools also allow you to set up policies that help you decide how you want to handle different types of web requests in your network.
57
57
58
58
### Wireless security
59
59
@@ -103,7 +103,7 @@ Firewalls can perform several different functions across your network:
103
103
104
104
-**Application-layer firewalls** can be a physical appliance or software-based, like a plug-in or a filter. These types of firewalls target your applications. For example, they could affect how requests for HTTP connections are inspected across each of your applications.
105
105
106
-
-**Packet filtering firewalls** scrutinize each data packet as it travels through your network. Based on rules you configure, they decide whether to block the specific packet or not.
106
+
-**Packet filtering firewalls** scrutinize each data packet as it travels through your network. they decide whether to block the specific packet or not based on rules you configure.
107
107
108
108
-**Circuit-level firewalls** check whether TCP and UDP connections across your network are valid before data is exchanged. For example, this type of firewall might first check whether the source and destination addresses, the user, the time, and date meet certain defined rules. When these checks pass and a session starts, data is exchanged between parties without further scrutiny.
109
109
@@ -121,7 +121,7 @@ Firewalls can perform several different functions across your network:
121
121
122
122
Firewalls help protect your network from the outside world. If you don't have a firewall set up:
123
123
124
-
-An attacker could employ malware and take advantage of your bandwidth to use it for themselves.
124
+
-Attackers could employ malware and take advantage of your bandwidth to use it for themselves.
125
125
- Sensitive and private information about employees and clients could be stolen.
126
126
- Your resources, devices, and the entire network could be held for ransom.
127
127
@@ -169,6 +169,6 @@ Configure **Azure virtual network service endpoints** so that critical Azure ser
169
169
170
170
**Disable SSH/RDP** access whenever possible. These protocols are used to manage your virtual machines from a remote location, but attackers could attempt brute-force attacks if no proper protections are in place. Create a point-to-site VPN connection before enabling SSH/RDP for remote management.
171
171
172
-
Use **load balancing** to improve the performance and availability of your network. When you use a load balancer, you distribute network traffic across the machines in your network. For example, if you have a couple of web servers that look after a website as part of your network, you can configure a load balancer to distribute the traffic between them. This way, you improve the performance and availability of the website.
172
+
Use **load balancing** to improve your network's performance and availability. When you use a load balancer, you distribute network traffic across the machines in your network. For example, if you have a couple of web servers that look after a website as part of your network, you can configure a load balancer to distribute the traffic between them. This way, you improve the performance and availability of the website.
173
173
174
-
A distributed denial-of-service (DDoS) attack overloads resources or services across your network so that they become unusable or inaccessible. **Azure DDoS Protection** provides automatic traffic monitoring and mitigating for DDoS attacks. You can interact with the service and enable additional features, like having access to DDoS experts, by upgrading to the Standard tier.
174
+
A distributed denial-of-service (DDoS) attack overloads resources or services across your network so that they become unusable or inaccessible. **Azure DDoS Protection** provides automatic traffic monitoring and mitigation for DDoS attacks. You can interact with the service and enable additional features, like having access to DDoS experts, by upgrading to the Standard tier.
0 commit comments