SECURITY FUNDAMENTALS

₵800.00
*
*
*
Qty:
(This product has a limit set to 1 item(s) per order)

Overview
This MTA Training course helps you prepare for Microsoft Technology Associate Exam 98-367, and build an understanding of these topics: Security Layers, Operating System Security, Network Security, and Security Software. This course leverages the same content as found in the Microsoft Official Academic Course (MOAC) for this exam.

TARGET AUDIENCE

The Microsoft Technology Associate (MTA) is Microsoft’s newest suite of technology certification exams that validate fundamental knowledge needed to begin building a career using Microsoft technologies. This program provides an appropriate entry point to a future career in technology and assumes some hands-on experience or training but does not assume on-the-job experience.

COURSE OBJECTIVES

After completing this course, students will be able to:

  • Understand Security Layers
  • Understand Operating System Security
  • Understand Network Security
  • Understand Security Software

COURSE CONTENT

Understanding Security Layers

  • Introducing Security
  • Understanding Confidentiality
  • Understanding Integrity
  • Understanding Availability
  • Defining Threats and Risk Management
  • Understanding the Principle of Least Privilege
  • Understanding Attack Surface
  • Understanding Social Engineering
  • Linking Cost with Security
  • Looking at Physical Security as the First Line of Defense
  • Understanding Site Security
  • Understanding Computer Security

Authentication, Authorization, and Accounting

  • Starting Security with Authentication
  • Authenticating with What You Know
  • Authenticating with What You Own or Possess
  • Authenticating with What You Are
  • Introducing RADIUS and TACACS1
  • Using Run As
  • Introducing Directory Services with Active Directory
  • Looking at Domain Controllers
  • Introducing NTLM
  • Introducing Kerberos
  • Using Organizational Units
  • Looking at Objects
  • Using Groups
  • Looking at Web Server Authentication
  • Comparing Rights and Permissions
  • Looking at NTFS
  • Using NTFS Permissions
  • Looking at Effective NTFS Permissions
  • Copying and Moving Files
  • Using Folder and File Owners
  • Sharing Drives and Folders
  • Looking at Special and Administrative Shares
  • Introducing the Registry
  • Using Encryption to Protect Data
  • Examining Types of Encryption
  • Introducing Public Key Infrastructure
  • Encrypting Email
  • Encrypting Files with EFS
  • Encrypting Disks in Windows
  • Introducing IPSec
  • Encrypting with VPN Technology
  • Using Auditing to Complete the Security Picture

Understanding Security Policies

  • Using Password Policies to Enhance Security
  • Using Password Complexity to Make a Stronger Password
  • Using Account Lockout to Prevent Hacking
  • Looking at Password Length
  • Using Password History to Enforce Security
  • Setting the Time between Password Changes
  • Using Password Group Policies to Enforce Security
  • Understanding Common Attack Methods

Understanding Network Security

  • Using Dedicated Firewalls to Protect a Network
  • Examining Hardware Firewalls and Their Characteristics
  • Using Hardware Firewalls versus Software Firewalls
  • Using Stateful versus Stateless Inspection
  • Controlling Access with Network Access Protection (NAP)
  • Understanding the Purpose of NAP
  • Looking at How NAP Works
  • Examining the Requirements for NAP
  • Using Isolation to Protect the Network
  • Understanding Virtual LANs
  • Understanding Routing
  • Looking at Intrusion Detection and Intrusion Prevention Systems
  • Looking at Honeypots
  • Looking at DMZs
  • Understanding Network Address Translation (NAT)
  • Understanding Virtual Private Networks (VPNs)
  • Understanding Internet Protocol Security (IPsec)
  • Using Other VPN Protocols
  • Looking at Server and Domain Isolation
  • Protecting Data with Protocol Security
  • Understanding Tunneling
  • Using DNS Security Extensions (DNSSEC)
  • Looking at Protocol Spoofing
  • Utilizing Network Sniffing
  • Understanding Common NETWORK Attack Methods
  • Securing Wireless Network
  • Using Service Set Identifier (SSID)
  • Understanding Keys
  • Utilizing MAC Filters
  • Considering Pros and Cons of Specific Security Types

Protecting the Server and Client

  • Protecting the Client Computer
  • Protecting Your Computer from Malware
  • Utilizing Windows Updates
  • Utilizing User Account Control
  • Using Windows Firewall
  • Using Offline Files
  • Locking Down a Client Computer
  • Protecting Your Email
  • Dealing with Spam
  • Relaying Email
  • Securing Internet Explorer
  • Looking at Cookies and Privacy Settings
  • Examining Content Zones
  • Phishing and Pharming
  • Protecting Your Server
  • Placing the Server
  • Hardening the Server
  • Using Secure Dynamic DNS

Price Includes International Curriculum Course ware And Very Active Real-Time Labs.

Security Fundamentals / Exam(s)

Schedule for Security Fundamentals
Course#Course ContentsExam#
MTA Security FundamentalsExam 98-367

2 Hours Daily 3 Times a Week
Total Duration 3 Months

Recommended Courses and Certification:
  • CompTIA Security +
  • CEH /CHFI
  • ENSA
  • Model: MTA Security Fundamentals
  • Manufacturer: Microsoft

Write Review

Note: Do not use HTML in the text.