
Training Microsoft Security Fundamentals exam 98-367
€249,00
Information
Order this great Elearning Training Microsoft Security Fundamentals exam 98-367 online course 1 year 24/7 access to rich interactive videos, voice, practice assignments, progress monitoring through reports and tests per subject to test the knowledge directly. After the course you will receive a certificate of participation..
Course content
Microsoft Security Fundamentals: Security Layers
- start the course
- recognize the characteristics of confidentiality
- recognize the characteristics of integrity
- recognize the characteristics of availability
- distinguish risk management strategies
- recognize the characteristics of the least privilege principle
- identify techniques for avoiding social engineering
- distinguish between the different components of attack surface
- identify characteristics of site security
- distinguish between the equipment used for securing computers
- identify the security challenges of removable devices and drives
- distinguish between the different technologies for securing mobile devices
- disable local logons
- identify characteristics of keyloggers
- configure browser settings
- configure Internet zones
- recognize characteristics of secure sites
- distinguish characteristics of different security types
- distinguish between different key options
- identify security considerations of a service set identifier, or SSID
- recognize benefits of MAC filters
- recognize core security principles
Microsoft Security Fundamentals: Operating System Security
- start the course
- recognize characteristics of authentication
- distinguish between different authentication methods
- recognize characteristics of RADIUS authentication
- identify characteristics of PKI
- use Run As to perform administrative tasks
- identify best practices when establishing password reset procedures
- distinguish between the types of permissions that can be applied
- identify characteristics of Active Directory permissions
- distinguish NTFS permission behaviors when copying and moving files
- distinguish and apply share permissions
- distinguish between NT file system, or NTFS, and file allocation table, or FAT, file systems permissions characteristics
- enable and disable inheritance
- set multiple groups with different permissions
- set ownership and delegation permission settings
- recognize password policy best practices
- implement password policy settings
- recognize common password attack methods
- distinguish between the different auditing types
- recognize auditing best practices
- enable and secure audits and audit information
- identify the characteristics of EFS
- distinguish between different encryption methods
- identify characteristics and uses of VPN and encryption algorithms
- recognize certificate properties and services policy best practices
- recognize characteristics of token devices
- recognize characteristics of buffer overflow
- distinguish between characteristics of worms, trojans, and spyware
- identify the best practices when using user authentication, permissions, passwords, and encryption to secure operating systems
Microsoft Security Fundamentals: Network Security
- start the course
- identify the purpose of firewalls
- recognize characteristics of packet filtering firewalls
- recognize characteristics of circuit-level firewalls
- recognize characteristics of application-level firewalls
- recognize characteristics of stateful multilevel firewalls
- recognize characteristics of software firewalls
- identify an appropriate firewall for network protection
- distinguish between stateful and stateless inspection
- identify the most appropriate inspection type to use
- identify the purpose of NAP
- identify NAP requirements
- identify characteristics of VLANs
- distinguish between ways to assign hosts to VLANs
- identify characteristics of routing
- distinguish between the two main types of IDS/IPS
- identify characteristics of honeypots
- identify characteristics of DMZs
- identify characteristics of NAT
- identify characteristics of VPNs
- identify characteristics of IPSec
- identify characteristics of server and domain isolation
- identify characteristics of tunneling
- identify characteristics of DNSSec
- identify characteristics of protocol spoofing
- identify characteristics of utility network sniffing
- distinguish between common attack methods
- identify characteristics of common attack methods
- identify best practices when using dedicated firewalls, NAP, network isolation, and protocol security to secure the network
Microsoft Security Fundamentals: Security Software
- start the course
- distinguish between types of malware
- identify characteristics of viruses
- enable and disable UAC
- use Windows Update/Windows Server Update Service
- encrypt offline files and folders
- recognize benefits of software restriction policies
- identify characteristics of spam filtering
- recognize characteristics of spoofing
- distinguish between phishing and pharming
- identify the advantages and disadvantages of both client and server protection
- describe how SPF records function
- describe how PTR records function
- identify separation of services best practices
- recognize importance of hardening the server
- recognize the benefits of ensuring that the OS and applications are kept current
- use secure dynamic DNS functionality
- disable unsecure authentication protocols
- recognize characteristics and benefits of a read-only domain controller
- describe the concept of separate management of VLAN
- use MBSA
- identify best practices when using security software for client, e-mail, and server protection
TestPrep 98-367 Microsoft Security Fundamentals
TestPrep 98-367 Microsoft Security Fundamentals
Heeft u niet gevonden wat u zocht?
Let us help!
Let us help!
Specifications
Product
General properties
Availabilty: | 9 hours |
Language: | English |
Certificate of participation: | Yes |
Online access: | 90 days |
Progress monitoring: | Yes |
Award Winning E-learning: | Yes |
Suitable for mobile: | Yes |
Reviews
Read or write a review