Comprehensive Video Tutorials

MTA Security Fundamentals (Exam 98-367) Online Course (12 months Access)

CareerVision Training

£ 204 - (Rs 16,633)

Important information

  • Course
  • Online
  • Duration:
  • When:
  • Online campus

Microsoft Technical Associate (MTA) Security Fundamentals is designed to provide students with an explanation and understanding of fundamental security concepts. MTA is a new certification program that Microsoft has created specifically for students entering into the IT industry for the first time. It validates the foundational knowledge needed to build and secure Microsoft Windows Servers, Windows-based network operating systems, Active Directory, account management, and system recovery tools. The MTA Security Fundamentals certification is a pathway for future certifications and career opportunities. Expert Tom Carpenter guides you through each exam objective seamlessly, all the while preparing you for the Microsoft Exam 98-367. This training course provides you with interactive videos that meet the needs of multiple styles of learning from auditory to visual. The MTA Security Fundamentals eLearning course includes a pre test and post test that accurately identifies your skill gap. Carpenter will guide you step by step and help you close your skill gap with content concentrating on each exam objective. Achieving MTA certifications is the first step toward becoming a Microsoft Certified Technology Specialist (MCTS).


* 9 Hours of Interactive Training on 3 CDs
* Understand the 3 security layers: Physical, Internet, and Wireless security
* Understand operating system security concepts
* Understand network security
* Understand and utilize security software and intrusion detection tools

What is Microsoft Technical Associate?

The Microsoft Technology Associate is a new, entry-level certification designed to help individuals take the first step toward a career as an IT professional or developer.

How does the MTA...

Important information

Where and when

Starts Location

What you'll learn on the course

IT Security

Course programme


Section A: Introduction
* Security Fundamentals
* Microsoft Certification Paths
* Knowledge Domains
* Taking the Exam
* Exam Prep Tips
Section B: Security Principles
* Windows Server Editions
* Least Privilege
* Attack Surface
* Defense-in-Depth
Section C: Threats and Risks
* Threats and Risks Defined
* Personal Risk Assessment
* Internal Threats
* External Threats
* Types of Attackers
* Common Attack Methods
* Social Engineering
* Attack Phases
Section D: Authentication Fundamentals
* Authentication
* Credential Types
* Weak Authentication
* Examples of Weak Authentication
* Strong Authentication
* RADIUS Servers
* User Directories
Section E: Windows/PKI Authentication
* Windows Authentication Methods
* Kerberos Authentication
* Public Key Cryptography
* Certificates
* Public Key Infrastructure
Section F: Password Policies
* Password Policy Options
* Password Hashes
* Account Lockout Policies
* runas Option
* Resetting the User Password
Section G: User/Group Management
* Creating New User Accounts
* New User Password
* Settings/Considerations
* Managing User Account Security
* Creating New Groups
* Managing Group Memberships


Section A: Permission Management
* Windows Permissions
* Delegating Administration Rights
* File System Permissions
* Understanding Offline Files
* Configuring NTFS Basic Permissions
* Configuring NTFS Advanced Permissions
* Overriding Inheritance Permissions
* Configuring Share Permissions
* Configuring Resource Ownership
* Understanding Permissions Inheritance
Section B: Auditing
* Auditing Defined
* Security Audit Events Spreadsheet
* Enabling Auditing in Group Policy Editor
* Configuring Advanced Auditing Policies
Section C: Physical Security Solutions
* Importance of Physical Security
* Physical Security Defined
* Physical Security Applications
* Physical Security Checklist
* Restricting Device Installation with GP
* Restricting Local Logon using GPE
* Understanding Keyloggers
Section D: Malware Protection
* Viruses Defined
* Worms Defined
* Types of Viruses
* Indications of Viral Infection
* Virus Phases
* Trojan Horses Defined
* Common Trojan Horse Programs
* Buffer Overflows Defined
Section E: Internet Explorer Security
* Internet Explorer General Options
* IT Security Zones
* Secure Web Sites
* InPrivate Filtering
* InPrivate Browsing
Section F: Encryption Basics
* Cryptography
* Simple Encryption
* Cryptography Concepts
* Uses of Cryptography
* Encryption Types
* Symmetric Encryption
* Asymmetric Encryption
* Public Key Cryptography
* PKI Applications
Section G: Windows Encryption Technologies
* Windows Encrypting File System
* EFS Benefits
* EFS Inheritance
* BitLocker Drive Encryption


Section A: Network Perimeter Security
* Firewalls
* Network Firewalls
* Packet Filtering Firewalls
* Stateful Inspection Firewall
* Personal Firewalls
* Hardware/Software
Section B: Network Segmentation
* Network Isolation
* VLAN Example
* VLAN Tagging
* Trunk Example
* Virtual Private Network
* VPN Protocols
* Perimeter Networks
* Perimeter Network Example
* NAT/Perimeter Networks
* Planning Perimeter Networks
* Honeypots
* Server/Domain Isolation
Section C: NAP
* Network Access Protection
* NAP Requirements
* NAP Implementation Methods
* NAP Architecture
Section D: Network Protocol Security
* Network Protocols
* Network Scanning
* Scanning Types
* Sniffers
* ARP Spoofing
Section E: Wireless Network Security
* Wi-Fi Vulnerabilities
* Wi-Fi Security
* Wired Equivalent Privacy
* 802.11i Security
* 802.1X
* 802.1X Demo
* 802.1X Deployment
Section F: Client Protection
* User Account Control Settings
* UAC Local Policies
* Run Users as Administrators
* Windows Updates
* Restriction/Control Policies
Section G: Server Protection
* Microsoft Baseline Security Analyzer
* MBSA Results
* Services
* Security Updating DNS
Section H: E-mail Protection
* E-mail Vulnerabilities
* E-mail Hygiene
* Protection Methods
* Junk E-mail Filtering