M40367A: MTA: Security Fundamentals

$1,295.00


  • Virtual Classroom

  • Onsite

← Continue Searching

Duration: 3 Days

In this course, you will be introduced to security concepts for today's business and technology professionals. You will cover layered security philosophy, physical security, Internet security, and wireless security principles. You will focus on operating system security, network security, and security software. The course is designed to help you prepare for Microsoft Technology Associate (MTA) Exam: 98-367 - Security Fundamentals, which can be taken outside of the course.

Proven Impact Exclusive!

Continue developing your skills after class with 24/7 access to our live remote labs for six months, providing you with valuable extra time for hands-on practice.

What You Will Learn

 

  • Offensive and defensive security strategies and approaches
  • Implement security in layers ranging from physical security, network security, and operating system security
  • Secure authentication, access-control on file systems, and password policies for users
  • Use Network Access Protection (NAP), firewalls, and protocol security for data in-flight
  • Use security software as counter-measures, including anti-virus software, anti-spam software, and encryption

Audience

 

IT management, project managers, compliance personnel, business analysts, or anyone who requires a basic understanding of core security concepts and their application in a private or public sector setting.

Prerequistes

 

General understanding and familiarity of IT business environments is beneficial

Course Outline

 

1. Security Layers

  • Security Fundamentals
  • Physical Security as the First Line of Defense
  • Core Security Principles
  • Physical Security

2. Authentication, Authorization, and Accounting

  • Authentication
  • Rights and Permissions
  • Auditing
  • Encryption
  • User Authentication
  • Audit Policies

3. Security Policies

  • Using Password Policies to Enhance Security

4. Network Security

  • Using Dedicated Firewalls to Protect a Network
  • Controlling Access with Network Access Protection (NAP)
  • Using Isolation to Protect the Network
  • Protecting Data with Protocol Security
  • Securing a Wireless Network
  • Network Isolation
  • Protocol Security
  • Wireless Security

5. Protecting the Server and Client

  • Protecting a Computer from Malware
  • Protecting the Client Computer
  • Protecting E-Mail
  • Protecting a Server
  • Securing Internet Explorer

Course Labs