Winkelwagen
U heeft geen artikelen in uw winkelwagen
Microsoft Windows Server Training Microsoft Security Fundamentals exam 98-367
Training Microsoft Security Fundamentals exam 98-367
€249,00

Goedkoper ergens anders?

Laat het ons weten!

+31367601019 [email protected]

Training Microsoft Security Fundamentals exam 98-367

|
Klik om te vergroten
€249,00 Excl. btw
€301,29 Incl. btw
Op voorraad
|
Bestel voor 16:00 uur en start vandaag.
Je hebt nog counting... uur
  • Gecertificeerde docenten
  • Beste opleider 2018
  • Cursist staat centraal
Cursusinhoud/-informatie

Bestel deze geweldige Elearning Training Microsoft Security Fundamentals exam 98-367 online cursus, 1 jaar 24/ 7 toegang tot rijke interactieve video’s, spraak, praktijkopdrachten, voortgangsbewaking door rapportages en testen per onderwerp om de kennis direct te toetsen. Na de cursus ontvangt u een certificaat van deelname.

Cursusinhoud

Microsoft Security Fundamentals: Security Layers

  • start the course
  • recognize the characteristics of confidentiality
  • recognize the characteristics of integrity
  • recognize the characteristics of availability
  • distinguish risk management strategies
  • recognize the characteristics of the least privilege principle
  • identify techniques for avoiding social engineering
  • distinguish between the different components of attack surface
  • identify characteristics of site security
  • distinguish between the equipment used for securing computers
  • identify the security challenges of removable devices and drives
  • distinguish between the different technologies for securing mobile devices
  • disable local logons
  • identify characteristics of keyloggers
  • configure browser settings
  • configure Internet zones
  • recognize characteristics of secure sites
  • distinguish characteristics of different security types
  • distinguish between different key options
  • identify security considerations of a service set identifier, or SSID
  • recognize benefits of MAC filters
  • recognize core security principles

Microsoft Security Fundamentals: Operating System Security

  • start the course
  • recognize characteristics of authentication
  • distinguish between different authentication methods
  • recognize characteristics of RADIUS authentication
  • identify characteristics of PKI
  • use Run As to perform administrative tasks
  • identify best practices when establishing password reset procedures
  • distinguish between the types of permissions that can be applied
  • identify characteristics of Active Directory permissions
  • distinguish NTFS permission behaviors when copying and moving files
  • distinguish and apply share permissions
  • distinguish between NT file system, or NTFS, and file allocation table, or FAT, file systems permissions characteristics
  • enable and disable inheritance
  • set multiple groups with different permissions
  • set ownership and delegation permission settings
  • recognize password policy best practices
  • implement password policy settings
  • recognize common password attack methods
  • distinguish between the different auditing types
  • recognize auditing best practices
  • enable and secure audits and audit information
  • identify the characteristics of EFS
  • distinguish between different encryption methods
  • identify characteristics and uses of VPN and encryption algorithms
  • recognize certificate properties and services policy best practices
  • recognize characteristics of token devices
  • recognize characteristics of buffer overflow
  • distinguish between characteristics of worms, trojans, and spyware
  • identify the best practices when using user authentication, permissions, passwords, and encryption to secure operating systems

Microsoft Security Fundamentals: Network Security

  • start the course
  • identify the purpose of firewalls
  • recognize characteristics of packet filtering firewalls
  • recognize characteristics of circuit-level firewalls
  • recognize characteristics of application-level firewalls
  • recognize characteristics of stateful multilevel firewalls
  • recognize characteristics of software firewalls
  • identify an appropriate firewall for network protection
  • distinguish between stateful and stateless inspection
  • identify the most appropriate inspection type to use
  • identify the purpose of NAP
  • identify NAP requirements
  • identify characteristics of VLANs
  • distinguish between ways to assign hosts to VLANs
  • identify characteristics of routing
  • distinguish between the two main types of IDS/IPS
  • identify characteristics of honeypots
  • identify characteristics of DMZs
  • identify characteristics of NAT
  • identify characteristics of VPNs
  • identify characteristics of IPSec
  • identify characteristics of server and domain isolation
  • identify characteristics of tunneling
  • identify characteristics of DNSSec
  • identify characteristics of protocol spoofing
  • identify characteristics of utility network sniffing
  • distinguish between common attack methods
  • identify characteristics of common attack methods
  • identify best practices when using dedicated firewalls, NAP, network isolation, and protocol security to secure the network

Microsoft Security Fundamentals: Security Software

  • start the course
  • distinguish between types of malware
  • identify characteristics of viruses
  • enable and disable UAC
  • use Windows Update/Windows Server Update Service
  • encrypt offline files and folders
  • recognize benefits of software restriction policies
  • identify characteristics of spam filtering
  • recognize characteristics of spoofing
  • distinguish between phishing and pharming
  • identify the advantages and disadvantages of both client and server protection
  • describe how SPF records function
  • describe how PTR records function
  • identify separation of services best practices
  • recognize importance of hardening the server
  • recognize the benefits of ensuring that the OS and applications are kept current
  • use secure dynamic DNS functionality
  • disable unsecure authentication protocols
  • recognize characteristics and benefits of a read-only domain controller
  • describe the concept of separate management of VLAN
  • use MBSA
  • identify best practices when using security software for client, e-mail, and server protection

TestPrep 98-367 Microsoft Security Fundamentals

TestPrep 98-367 Microsoft Security Fundamentals
Heeft u niet gevonden wat u zocht?
Laat ons helpen!
Specificaties
Product
Algemene eigenschappen
Duur: 9 uur
Taal: Engels
Certificaat van deelname: Ja
Online toegang: 365 dagen
Voortgangsbewaking: Ja
Award Winning E-learning: Ja
Geschikt voor mobiel: Ja
Beoordelingen
average of 0 review(s)
Geen reviews gevonden
Help ons en andere klanten door het schrijven van een review
Schrijf uw beoordeling!




Wij slaan cookies op om onze website te verbeteren. Is dat akkoord? Ja Nee Meer over cookies »