Microsoft Windows Server Microsoft Security Fundamentals exam 98-367 E-Learning
Microsoft Security Fundamentals exam 98-367 E-Learning
€159,00
Microsoft Windows Server

Microsoft Security Fundamentals exam 98-367 E-Learning

EUR 159,00 Excl. btw
  • Koop 2 voor €155,82 per stuk en bespaar 2%
  • Koop 3 voor €154,23 per stuk en bespaar 3%
  • Koop 4 voor €152,64 per stuk en bespaar 4%
  • Koop 5 voor €151,05 per stuk en bespaar 5%
  • Koop 10 voor €143,10 per stuk en bespaar 10%
  • Koop 25 voor €135,15 per stuk en bespaar 15%
  • Koop 50 voor €127,20 per stuk en bespaar 20%

Training Microsoft Security Fundamentals exam 98-367 - Online E-Learning Cursus. Bestellen en direct starten voor de beste prijs.

  • E-Learning - Online toegang: 365 dagen
  • Taal: Engels (US)
  • Certificaat van deelname
Op voorraad
Bestel voor 16:00 uur en start vandaag.
Aantal
- +
  • Voor 23:00 uur besteld, morgen in huis
  • Certificaat van deelname
  • Bedrijven bestellen op factuur
  • Betaal in 3x geen extra kosten 0% rente en zonder BKR met in3
  • Meer informatie? Neem contact op over dit product
Productomschrijving

Microsoft Security Fundamentals exam 98-367 E-Learning Training

Bestel deze geweldige E-Learning Training Microsoft Security Fundamentals exam 98-367 online cursus, 1 jaar 24/ 7 toegang tot rijke interactieve video’s, spraak, praktijkopdrachten, voortgangsbewaking door rapportages en testen per onderwerp om de kennis direct te toetsen. Na de cursus ontvangt u een certificaat van deelname.

Cursusinhoud

Microsoft Security Fundamentals: Security Layers

start the course
recognize the characteristics of confidentiality
recognize the characteristics of integrity
recognize the characteristics of availability
distinguish risk management strategies
recognize the characteristics of the least privilege principle
identify techniques for avoiding social engineering
distinguish between the different components of attack surface
identify characteristics of site security
distinguish between the equipment used for securing computers
identify the security challenges of removable devices and drives
distinguish between the different technologies for securing mobile devices
disable local logons
identify characteristics of keyloggers
configure browser settings
configure Internet zones
recognize characteristics of secure sites
distinguish characteristics of different security types
distinguish between different key options
identify security considerations of a service set identifier, or SSID
recognize benefits of MAC filters
recognize core security principles

Microsoft Security Fundamentals: Operating System Security

start the course
recognize characteristics of authentication
distinguish between different authentication methods
recognize characteristics of RADIUS authentication
identify characteristics of PKI
use Run As to perform administrative tasks
identify best practices when establishing password reset procedures
distinguish between the types of permissions that can be applied
identify characteristics of Active Directory permissions
distinguish NTFS permission behaviors when copying and moving files
distinguish and apply share permissions
distinguish between NT file system, or NTFS, and file allocation table, or FAT, file systems permissions characteristics
enable and disable inheritance
set multiple groups with different permissions
set ownership and delegation permission settings
recognize password policy best practices
implement password policy settings
recognize common password attack methods
distinguish between the different auditing types
recognize auditing best practices
enable and secure audits and audit information
identify the characteristics of EFS
distinguish between different encryption methods
identify characteristics and uses of VPN and encryption algorithms
recognize certificate properties and services policy best practices
recognize characteristics of token devices
recognize characteristics of buffer overflow
distinguish between characteristics of worms, trojans, and spyware
identify the best practices when using user authentication, permissions, passwords, and encryption to secure operating systems

Microsoft Security Fundamentals: Network Security

start the course
identify the purpose of firewalls
recognize characteristics of packet filtering firewalls
recognize characteristics of circuit-level firewalls
recognize characteristics of application-level firewalls
recognize characteristics of stateful multilevel firewalls
recognize characteristics of software firewalls
identify an appropriate firewall for network protection
distinguish between stateful and stateless inspection
identify the most appropriate inspection type to use
identify the purpose of NAP
identify NAP requirements
identify characteristics of VLANs
distinguish between ways to assign hosts to VLANs
identify characteristics of routing
distinguish between the two main types of IDS/IPS
identify characteristics of honeypots
identify characteristics of DMZs
identify characteristics of NAT
identify characteristics of VPNs
identify characteristics of IPSec
identify characteristics of server and domain isolation
identify characteristics of tunneling
identify characteristics of DNSSec
identify characteristics of protocol spoofing
identify characteristics of utility network sniffing
distinguish between common attack methods
identify characteristics of common attack methods
identify best practices when using dedicated firewalls, NAP, network isolation, and protocol security to secure the network

Microsoft Security Fundamentals: Security Software

start the course
distinguish between types of malware
identify characteristics of viruses
enable and disable UAC
use Windows Update/Windows Server Update Service
encrypt offline files and folders
recognize benefits of software restriction policies
identify characteristics of spam filtering
recognize characteristics of spoofing
distinguish between phishing and pharming
identify the advantages and disadvantages of both client and server protection
describe how SPF records function
describe how PTR records function
identify separation of services best practices
recognize importance of hardening the server
recognize the benefits of ensuring that the OS and applications are kept current
use secure dynamic DNS functionality
disable unsecure authentication protocols
recognize characteristics and benefits of a read-only domain controller
describe the concept of separate management of VLAN
use MBSA
identify best practices when using security software for client, e-mail, and server protection

TestPrep 98-367 Microsoft Security Fundamentals

TestPrep 98-367 Microsoft Security Fundamentals

Specificaties
Duur 9 uur
Taal Engels
Certificaat van deelname Ja
Online toegang 365 dagen
Voortgangsbewaking Ja
Award Winning E-learning Ja
Geschikt voor mobiel Ja
Wat onze klanten zeggen

average of 0 review(s)

Geen reviews gevonden
Help ons en andere klanten door het schrijven van een review
Mijn account
You are not logged in. Log in to make use of all the benefits. Or create an account now.
Taal
Winkelwagen
Uw winkelwagen is leeg
Menu
Zoeken
Search suggestions
Geen cursussen of trainingen gevonden...
Wij slaan cookies op om onze website te verbeteren. Is dat akkoord? Ja Nee Meer over cookies »