This report is an IT security guidebook created for junior IT security specialists. It covers three main areas: risks and security procedures, security technologies, and monitoring and endpoint integrity. The first section details various security risks like misconfigured networks, denial-of-service attacks, rogue networks, and malware. It also discusses organizational security processes and methods for assessing IT security risks. The second section focuses on security technologies, specifically the impact of incorrect firewall and VPN configurations, and the implementation of different network types such as DMS, static IP, and NAT networks. The final section highlights the benefits of monitoring systems, including problem-solving, security issue detection, and ROI. The report concludes with a summary of the importance of IT security and the various methods for maintaining it.