Summary

Completed

Without a thorough understanding of network security, an organization is vulnerable to attacks and performance issues on its network. This vulnerability can negatively affect the organization's finances and reputation.

In this module, we discussed how authentication and authorization are used to protect a network. We covered how a network is monitored for intrusion, performance, and availability. We also explored the Azure tools that can help in these efforts.

You should now have a better understanding of how to protect the resources, devices, and users on your network.