Loading...
Login / Register

MTA Security Fundamentals

This three-day MTA Training course helps you prepare for Microsoft Technology Associate Exam 98-367, and build an understanding of these topics: Security Layers, Operating System Security, Network Security, Security Soft... Show More
Course Prerequisites:
Computer Literacy and Windows 7
Request a Quote

Instructor-Led Training (ILT)

Attend training in a classroom environment at a campus near you. Instructor-led training is still the number one delivery method of choice because it allows you to interact and discuss the training material, either individually or in a group setting, and you gain access to expert knowledge from certified instructors. This form of guided learning is impactful and produces positive learning outcomes. Day, evening and Saturday classes are offered.

Exam
Included

Duration
3 Days

Course Content

Understanding Security Layers

  • Understand core security principles.
    This objective may include but is not limited to: confidentiality; integrity; availability; how threat and risk impact principles; principle of least privilege; social engineering; attack surface
  • Understand physical security.
    This objective may include but is not limited to: site security; computer security; removable devices and drives; access control; mobile device security; disable Log On Locally; keyloggers
  • Understand Internet security.
    This objective may include but is not limited to: browser settings; zones; secure Web sites
  • Understand wireless security.
    This objective may include but is not limited to: advantages and disadvantages of specific security types; keys; SSID; MAC filters

Understanding Operating System Security

  • Understand user authentication.
    This objective may include but is not limited to: multifactor; smart cards; RADIUS; Public Key Infrastucture (PKI); understand the certificate chain; biometrics; Kerberos and time skew; using Run As to perform administrative tasks; password reset procedures
  • Understand permissions.
    This objective may include but is not limited to: file; share; registry; Active Directory; NTFS vs. FAT; enabling or disabling inheritance; behavior when moving or copying files within the same disk or on another disk; multiple groups with different permissions; basic permissions and advanced permissions; take ownership; delegation;
  • Understand password policies.
    This objective may include but is not limited to: password complexity; account lockout; password length; password history; time between password changes; enforce by using group policies; common
    attack methods
  • Understand audit policies.
    This objective may include but is not limited to: types of auditing; what can be audited; enabling auditing; what to audit for specific purposes; where to save audit information; how to secure audit information
  • Understand encryption.
    This objective may include but is not limited to: EFS; how EFS encrypted folders impact moving/copying files; BitLocker (To Go); TPM; software-based encryption; MAIL encryption and signing and other uses; VPN; public-key / private key; encryption algorithms; certificate properties; certificate services; PKI/certificate services infrastructure; token devices
  • Understand malware.
    This objective may include but is not limited to: buffer overflow; worms; Trojans; spyware;

Understanding Network Security

  • Understand dedicated firewalls.
    This objective may include but is not limited to: types of hardware firewalls and their characteristics; why to use a hardware firewall instead of a software firewall; SCMs and UTMs; stateful vs. stateless inspection
  • Understand Network Access Protection (NAP).
    This objective may include but is not limited to: purpose of NAP; requirements for NAP
  • Understand network isolation.
    This objective may include but is not limited to: VLANs; routing; honeypot; perimeter networks; NAT; VPN; Ipsec; Server and Domain Isolation.
  • Understand protocol security.
    This objective may include but is not limited to: protocol spoofing; IP Sec; tunneling; DNSsec; network sniffing; common attack methods

Understanding Security Software

  • Understand client protection.
    This objective may include but is not limited to: antivirus; User Account Control (UAC); keeping client operating system and software updated; encrypting offline folders; software restriction policies
  • Understand e-mail protection.
    This objective may include but is not limited to: antispam; antivirus; spoofing, phishing, and pharming; client vs. server protection; SPF records; PTR records
  • Understand server protection.
    This objective may include but is not limited to: separation of services; hardening; ); keeping server updated; secure dynamic DNS updates; disabling unsecure authentication protocols; Read-Only Domain Controllers; separate management VLAN; Microsoft Baseline Security Analyzer (MBSA)
CTU Training Solutions , Updated: October 9th, 2017

Share with friends

Request a Quote



Your Name

Your Surname

Contact Number

Your Email

Company

Which campus would you like to study at?

Your job title

Will your training be sponsored?

Message

The course information above is subject to change without notification due to market trends in the industry, legislation and/or programme version updates. Terms and Conditions

Join the CTU community

Join the CTU Community Portal and gain access to superior resources.

Join for Free

Thank you for printing this page.
Logo
0861 100 395
[email protected]
www.ctutraining.ac.za

X

Call me Back

Leave your details and we'll contact you back!

Your Name:

Your Email:


Contact Number:

Choose a campus