Start Your Microsoft Certified Career With Microsoft MTA: Security Fundamentals!
This certification validates that a candidate has fundamental security knowledge and skills. It can serve as a stepping stone to the Microsoft Certified Solutions Associate (MCSA) exams. It is recommended that candidates become familiar with the concepts and the technologies described here by taking relevant training courses. Candidates are expected to have some hands-on experience with Windows Server, Windows-based networking, Active Directory, anti-malware products, firewalls, network topologies and devices and network ports.
What The Course Will Teach You:
- Understand Security Layers
- Understanding Operating System Security
- Understand Network Security
- Understand Security Software
- Much more...
Units Of Study
Microsoft MTA: Security Fundamentals
Understand security layers (25–30%)
Understand core security principles
• Confidentiality; integrity; availability; how threat and risk impact principles; principle of least privilege; social engineering; attack surface analysis; threat modelling
Understand physical security
• Site security; computer security; removable devices and drives; access control; mobile device security; keyloggers
Understand Internet security
• Browser security settings; secure websites
Understand wireless security
• Advantages and disadvantages of specific security types; keys; service set identifiers (SSIDs); MAC filters
Understand operating system security (35-40%)
Understand user authentication
• Multifactor authentication; physical and virtual smart cards; Remote Authentication Dial-In User Service (RADIUS); biometrics; use Run As to perform administrative tasks
• File system permissions; share permissions; registry; Active Directory; enable or disable inheritance; behaviour when moving or copying files within the same disk or on another disk; multiple groups with different permissions; basic permissions and advanced permissions; take ownership; delegation; inheritance
Understand password policies
• Password complexity; account lockout; password length; password history; time between password changes; enforce by using Group Policies; common attack methods; password reset procedures; protect domain user account passwords
Understand audit policies
• Types of auditing; what can be audited; enable auditing; what to audit for specific purposes; where to save audit information; how to secure audit information
• Encrypting file system (EFS); how EFS-encrypted folders impact moving/copying files; BitLocker (To Go); TPM; software-based encryption; MAIL encryption and signing and other uses; virtual private network (VPN); public key/private key; encryption algorithms; certificate properties; certificate services; PKI/certificate services infrastructure; token devices; lock down devices to run only trusted applications
• Buffer overflow; viruses, polymorphic viruses; worms; Trojan horses; spyware; ransomware; adware; rootkits; backdoors; zero day attacks
Understand network security (20–25%)
Understand dedicated firewalls
• Types of hardware firewalls and their characteristics; when to use a hardware firewall instead of a software firewall; stateful versus stateless firewall inspection; Security Compliance Manager; security baselines
Understand network isolation
• Routing; honeypot; perimeter networks; network address translation (NAT); VPN; IPsec; server and domain isolation
Understand protocol security
• Protocol spoofing; IPsec; tunnelling; DNSsec; network sniffing; denial-of-service (DoS) attacks; common attack methods
Understand security software (15–20%)
Understand client protection
• Antivirus; protect against unwanted software installations; User Account Control (UAC); keep client operating system and software updated; encrypt offline folders, software restriction policies; principle of least privilege
Understand email protection
• Antispam, antivirus, spoofing, phishing and pharming; client versus server protection; Sender Policy Framework (SPF) records; PTR records
Understand server protection
• Separation of services; hardening; keep server updated; secure dynamic Domain Name System (DNS) updates; disable unsecure authentication protocols; Read-Only Domain Controllers (RODC)
With eCourses4You's e-learning system, certification has never been simpler! You can be starting your IT career or taking your current IT skills to the next level in just a few short weeks. Our award winning learning system gives you all of the benefits of a live class at just a fraction of the cost.
eCourses4You’s courses include:
Expert Instructor-Led Training
eCourses4You uses only the industry’s finest instructors in the IT industry. They have a minimum of 15 years real-world experience and are subject matter experts in their fields. Unlike a live class, you can fast-forward, repeat or rewind all your lectures. This creates a personal learning experience and gives you all the benefit of hands-on training with the flexibility of doing it around your schedule 24/7.
Visual Demonstrations & Multimedia Presentations
Our courseware includes instructor-led demonstrations and visual presentations that allow students to develop their skills based on real world scenarios explained by the instructor. eCourses4You always focuses on real world scenarios and skill-set development.
Quizzes & Exam Simulators
eCourses4You’s custom practice exams prepare you for your exams differently and more effectively than the traditional exam preps on the market. You will have practice quizzes after each module to ensure you are confident on the topic you have completed before proceeding.
This will allow you to gauge your effectiveness before moving to the next module in your course. eCourses4You Courses also include practice exams designed to replicate and mirror the environment in the testing center. These exams are on average 100 questions to ensure you are 100% prepared before taking your certification exam.
Social Learning & Networking
Flash Cards & Educational Games
Navigation & Controls
Minimum specifications for the computer are:
Microsoft Windows XP, or later
Modern and up to date Browser (Internet Explorer 8 or later, Firefox, Chrome, Safari)
OSX/iOS 6 or later
Modern and up to date Browser (Firefox, Chrome, Safari)
Internet bandwidth of 1Mb or faster
Flash player or a browser with HTML5 video capabilities (We recommend Google Chrome)