Cart
You have no items in your shopping cart
Microsoft Windows Server Training Microsoft Security Fundamentals exam 98-367
Training Microsoft Security Fundamentals exam 98-367
€249,00

Cheaper somewhere else?

Let us know!

+31367601019 [email protected]

Training Microsoft Security Fundamentals exam 98-367

|
Click to enlarge
€249,00 Excl. tax
€301,29 Incl. tax
In stock
|
Order before 4:00 PM and start today.
You have got counting... hours
  • Gecertificeerde docenten
  • Beste opleider 2018
  • Cursist staat centraal
Information

Order this great Elearning Training Microsoft Security Fundamentals exam 98-367 online course  1 year 24/7 access to rich interactive videos, voice, practice assignments, progress monitoring through reports and tests per subject to test the knowledge directly. After the course you will receive a certificate of participation..

Course content

Microsoft Security Fundamentals: Security Layers

  • start the course
  • recognize the characteristics of confidentiality
  • recognize the characteristics of integrity
  • recognize the characteristics of availability
  • distinguish risk management strategies
  • recognize the characteristics of the least privilege principle
  • identify techniques for avoiding social engineering
  • distinguish between the different components of attack surface
  • identify characteristics of site security
  • distinguish between the equipment used for securing computers
  • identify the security challenges of removable devices and drives
  • distinguish between the different technologies for securing mobile devices
  • disable local logons
  • identify characteristics of keyloggers
  • configure browser settings
  • configure Internet zones
  • recognize characteristics of secure sites
  • distinguish characteristics of different security types
  • distinguish between different key options
  • identify security considerations of a service set identifier, or SSID
  • recognize benefits of MAC filters
  • recognize core security principles

Microsoft Security Fundamentals: Operating System Security

  • start the course
  • recognize characteristics of authentication
  • distinguish between different authentication methods
  • recognize characteristics of RADIUS authentication
  • identify characteristics of PKI
  • use Run As to perform administrative tasks
  • identify best practices when establishing password reset procedures
  • distinguish between the types of permissions that can be applied
  • identify characteristics of Active Directory permissions
  • distinguish NTFS permission behaviors when copying and moving files
  • distinguish and apply share permissions
  • distinguish between NT file system, or NTFS, and file allocation table, or FAT, file systems permissions characteristics
  • enable and disable inheritance
  • set multiple groups with different permissions
  • set ownership and delegation permission settings
  • recognize password policy best practices
  • implement password policy settings
  • recognize common password attack methods
  • distinguish between the different auditing types
  • recognize auditing best practices
  • enable and secure audits and audit information
  • identify the characteristics of EFS
  • distinguish between different encryption methods
  • identify characteristics and uses of VPN and encryption algorithms
  • recognize certificate properties and services policy best practices
  • recognize characteristics of token devices
  • recognize characteristics of buffer overflow
  • distinguish between characteristics of worms, trojans, and spyware
  • identify the best practices when using user authentication, permissions, passwords, and encryption to secure operating systems

Microsoft Security Fundamentals: Network Security

  • start the course
  • identify the purpose of firewalls
  • recognize characteristics of packet filtering firewalls
  • recognize characteristics of circuit-level firewalls
  • recognize characteristics of application-level firewalls
  • recognize characteristics of stateful multilevel firewalls
  • recognize characteristics of software firewalls
  • identify an appropriate firewall for network protection
  • distinguish between stateful and stateless inspection
  • identify the most appropriate inspection type to use
  • identify the purpose of NAP
  • identify NAP requirements
  • identify characteristics of VLANs
  • distinguish between ways to assign hosts to VLANs
  • identify characteristics of routing
  • distinguish between the two main types of IDS/IPS
  • identify characteristics of honeypots
  • identify characteristics of DMZs
  • identify characteristics of NAT
  • identify characteristics of VPNs
  • identify characteristics of IPSec
  • identify characteristics of server and domain isolation
  • identify characteristics of tunneling
  • identify characteristics of DNSSec
  • identify characteristics of protocol spoofing
  • identify characteristics of utility network sniffing
  • distinguish between common attack methods
  • identify characteristics of common attack methods
  • identify best practices when using dedicated firewalls, NAP, network isolation, and protocol security to secure the network

Microsoft Security Fundamentals: Security Software

  • start the course
  • distinguish between types of malware
  • identify characteristics of viruses
  • enable and disable UAC
  • use Windows Update/Windows Server Update Service
  • encrypt offline files and folders
  • recognize benefits of software restriction policies
  • identify characteristics of spam filtering
  • recognize characteristics of spoofing
  • distinguish between phishing and pharming
  • identify the advantages and disadvantages of both client and server protection
  • describe how SPF records function
  • describe how PTR records function
  • identify separation of services best practices
  • recognize importance of hardening the server
  • recognize the benefits of ensuring that the OS and applications are kept current
  • use secure dynamic DNS functionality
  • disable unsecure authentication protocols
  • recognize characteristics and benefits of a read-only domain controller
  • describe the concept of separate management of VLAN
  • use MBSA
  • identify best practices when using security software for client, e-mail, and server protection

TestPrep 98-367 Microsoft Security Fundamentals

TestPrep 98-367 Microsoft Security Fundamentals
Heeft u niet gevonden wat u zocht?
Let us help!
Specifications
Product
General properties
Availabilty: 9 hours
Language: English
Certificate of participation: Yes
Online access: 90 days
Progress monitoring: Yes
Award Winning E-learning: Yes
Suitable for mobile: Yes
Reviews
average of 0 review(s)
No reviews found
Read or write a review
Write a review




Please accept cookies to help us improve this website Is this OK? Yes No More on cookies »