40367
Security Fundamentals


  • Duration: 3 days
  • Price: $1,557.00
  • Certifications: MTA: IT Infrastructure
  • Exams: 98-367
Course Overviewremove_circle_outline

With this Microsoft Technology Associate (MTA) Training course, you can prepare for MTA Exam 98-367. Build an understanding of security layers, operating system security, network security, and security software.

Course Objectivesadd_circle_outline

*Understanding Security Layers. Learn about defense in depth and the various options available for securing resources at the various layers at a high level.

*Authentication, Authorization, and Accounting. Get an introduction to the topics of authentication, authorization, and accounting—what they are, how they are different, and how each is implemented and managed. Look at available options and how to use some of the tools in Windows for implementing each one.

*Understanding Security Policies. Hear about security policies and how they may work in an organization. See how policies provided by Group Policy can prevent unauthorized access to an organization's resources.

*Understanding Network Security. A network can be the most vulnerable part of an IT infrastructure. Learn some of the methods and options for securing these invaluable assets, and gain from a discussion of firewalls, Network Access Protection (NAP), protocols, and wireless networks, from a security standpoint.

*Protecting the Server and Client. Learn about protecting the physical assets in your organization, including servers and clients—and the software running on them—and how to secure them.

Course Outlineadd_circle_outline

Lesson 1: Understanding Security Layers

  • Key Terms
  • Introducing Security
  • Understanding Confidentiality
  • Understanding Integrity
  • Understanding Availability
  • Defining Threats and Risk Management
  • Understanding the Principle of Least Privilege
  • Understanding Attack Surface
  • Understanding Social Engineering
  • Linking Cost with Security
  • Looking at Physical Security as the First Line of Defense
  • Understanding Site Security
  • Understanding Computer Security
  • Skill Summary
  • Knowledge Assessment
  • Workplace Ready

Lesson 2: Authentication,Authorization, and Accounting

  • Key Terms
  • Starting Security with Authentication
  • Authenticating with What You Know
  • Authenticating with What You Own or Possess
  • Authenticating with What You Are
  • Introducing RADIUS and TACACS1
  • Using Run As
  • Introducing Directory Services with Active Directory
  • Looking at Domain Controllers
  • Introducing NTLM
  • Introducing Kerberos
  • Using Organizational Units
  • Looking at Objects
  • Using Groups
  • Looking at Web Server Authentication
  • Comparing Rights and Permissions
  • Looking at NTFS
  • Using NTFS Permissions
  • Looking at Effective NTFS Permissions
  • Copying and Moving Files
  • Using Folder and File Owners
  • Sharing Drives and Folders
  • Looking at Special and Administrative Shares
  • Introducing the Registry
  • Using Encryption to Protect Data
  • Examining Types of Encryption
  • Introducing Public Key Infrastructure
  • Encrypting Email
  • Encrypting Files with EFS
  • Encrypting Disks in Windows
  • Introducing IPSec
  • Encrypting with VPN Technology
  • Using Auditing to Complete the Security Picture
  • Skill Summary
  • Knowledge Assessment
  • Workplace Ready

Lesson 3: Understanding Security Policies

  • Key Terms
  • Using Password Policies to Enhance Security
  • Using Password Complexity to Make a Stronger Password
  • Using Account Lockout to Prevent Hacking
  • Looking at Password Length
  • Using Password History to Enforce Security
  • Setting the Time between Password Changes
  • Using Password Group Policies to Enforce Security
  • Understanding Common Attack Methods
  • Skill Summary
  • Knowledge Assessment
  • Workplace Ready

Lesson 4: Understanding Network Security

  • Key Terms
  • Using Dedicated Firewalls to Protect a Network
  • Examining Hardware Firewalls and Their Characteristics
  • Using Hardware Firewalls versus Software Firewalls
  • Using Stateful versus Stateless Inspection
  • Controlling Access with Network Access Protection (NAP)
  • Understanding the Purpose of NAP
  • Looking at How NAP Works
  • Examining the Requirements for NAP
  • Using Isolation to Protect the Network
  • Understanding Virtual LANs
  • Understanding Routing
  • Looking at Intrusion Detection and Intrusion Prevention Systems
  • Looking at Honeypots
  • Looking at DMZs
  • Understanding Network Address Translation (NAT)
  • Understanding Virtual Private Networks (VPNs)
  • Understanding Internet Protocol Security (IPsec)
  • Using Other VPN Protocols
  • Looking at Server and Domain Isolation
  • Protecting Data with Protocol Security
  • Understanding Tunneling
  • Using DNS Security Extensions (DNSSEC)
  • Looking at Protocol Spoofing
  • Utilizing Network Sniffing
  • Understanding Common NETWORK Attack Methods
  • Securing Wireless Network
  • Using Service Set Identifier (SSID)
  • Understanding Keys
  • Utilizing MAC Filters
  • Considering Pros and Cons of Specific Security Types
  • Skill Summary
  • Knowledge Assessment
  • Workplace Ready

Lesson 5: Protecting the Server and Client

  • Key Terms
  • Protecting the Client Computer
  • Protecting Your Computer from Malware
  • Utilizing Windows Updates
  • Utilizing User Account Control
  • Using Windows Firewall
  • Using Offline Files
  • Locking Down a Client Computer
  • Protecting Your Email
  • Dealing with Spam
  • Relaying Email
  • Securing Internet Explorer
  • Looking at Cookies and Privacy Settings
  • Examining Content Zones
  • Phishing and Pharming
  • Protecting Your Server
  • Placing the Server
  • Hardening the Server
  • Using Secure Dynamic DNS
  • Skill Summary
  • Knowledge Assessment
  • Workplace Ready
Prerequisitesadd_circle_outline

N/A

Upcoming Classes
  • Click below to see more class dates with course versions
  • See More Dates
Have questions? Let us help you.