Microsoft MTA: Security Fundamentals

£719.00

This certification validates that a candidate has fundamental security knowledge and skills. It can serve as a stepping stone to the Microsoft Certified Solutions Associate (MCSA) exams. It is recommended that candidates become familiar with the concepts and the technologies described here by taking relevant training courses. Candidates are expected to have some hands-on experience with Windows Server, Windows-based networking, Active Directory, anti-malware products, firewalls, network topologies and devices and network ports.

SKU: EC4Y0149 Categories: ,

This certification validates that a candidate has fundamental security knowledge and skills. It can serve as a stepping stone to the Microsoft Certified Solutions Associate (MCSA) exams. It is recommended that candidates become familiar with the concepts and the technologies described here by taking relevant training courses. Candidates are expected to have some hands-on experience with Windows Server, Windows-based networking, Active Directory, anti-malware products, firewalls, network topologies and devices and network ports.

What’s Included?

Wiki_tick  Unlimited access for 12 months
Wiki_tick  Access anywhere, any time
Wiki_tick  Fast effective training, written and designed by industry experts
Wiki_tick  Track your progress with our Learning Management System
Wiki_tick  Unlimited support
Wiki_tick  Save money, time and travel costs
Wiki_tick  Learn at your own pace and leisure
Wiki_tick  Easier to retain knowledge and revise topics than traditional methods
Wiki_tick  Exam preparation quizzes, tests and mock exams to ensure that you are 100% ready

£719.00Add to cart

Modules

Understand security layers (25–30%)

Understand core security principles

• Confidentiality; integrity; availability; how threat and risk impact principles; principle of least privilege; social engineering; attack surface analysis; threat modelling

Understand physical security

• Site security; computer security; removable devices and drives; access control; mobile device security; keyloggers

Understand Internet security

• Browser security settings; secure websites

Understand wireless security

• Advantages and disadvantages of specific security types; keys; service set identifiers (SSIDs); MAC filters

Understand operating system security (35-40%)

Understand user authentication

• Multifactor authentication; physical and virtual smart cards; Remote Authentication Dial-In User Service (RADIUS); biometrics; use Run As to perform administrative tasks

Understand permissions

• File system permissions; share permissions; registry; Active Directory; enable or disable inheritance; behaviour when moving or copying files within the same disk or on another disk; multiple groups with different permissions; basic permissions and advanced permissions; take ownership; delegation; inheritance

Understand password policies

• Password complexity; account lockout; password length; password history; time between password changes; enforce by using Group Policies; common attack methods; password reset procedures; protect domain user account passwords

Understand audit policies

• Types of auditing; what can be audited; enable auditing; what to audit for specific purposes; where to save audit information; how to secure audit information

Understand encryption

• Encrypting file system (EFS); how EFS-encrypted folders impact moving/copying files; BitLocker (To Go); TPM; software-based encryption; MAIL encryption and signing and other uses; virtual private network (VPN); public key/private key; encryption algorithms; certificate properties; certificate services; PKI/certificate services infrastructure; token devices; lock down devices to run only trusted applications

Understand malware

• Buffer overflow; viruses, polymorphic viruses; worms; Trojan horses; spyware; ransomware; adware; rootkits; backdoors; zero day attacks

Understand network security (20–25%)

Understand dedicated firewalls

• Types of hardware firewalls and their characteristics; when to use a hardware firewall instead of a software firewall; stateful versus stateless firewall inspection; Security Compliance Manager; security baselines

Understand network isolation

• Routing; honeypot; perimeter networks; network address translation (NAT); VPN; IPsec; server and domain isolation

Understand protocol security

• Protocol spoofing; IPsec; tunnelling; DNSsec; network sniffing; denial-of-service (DoS) attacks; common attack methods

Understand security software (15–20%)

Understand client protection

• Antivirus; protect against unwanted software installations; User Account Control (UAC); keep client operating system and software updated; encrypt offline folders, software restriction policies; principle of least privilege

Understand email protection

• Antispam, antivirus, spoofing, phishing and pharming; client versus server protection; Sender Policy Framework (SPF) records; PTR records

Understand server protection

• Separation of services; hardening; keep server updated; secure dynamic Domain Name System (DNS) updates; disable unsecure authentication protocols; Read-Only Domain Controllers (RODC)

System Requirements

Minimum specifications for the computer are:

Windows:

Microsoft Windows XP, or later
Modern and up to date Browser (Internet Explorer 8 or later, Firefox, Chrome, Safari)

MAC/iOS:

OSX/iOS 6 or later
Modern and up to date Browser (Firefox, Chrome, Safari)

All systems:

Internet bandwidth of 1Mb or faster
Flash player or a browser with HTML5 video capabilities (We recommend Google Chrome)