Live Chat
Monday - Friday 8am - 6pm EST Chat Now
Contact Us
Monday - Friday 8am - 8pm EST 1-800-268-7737 Other Contact Options

Cart () Loading...

    • Quantity:
    • Delivery:
    • Dates:
    • Location:


MTA: Security Fundamentals

Gain a better understanding of the core enterprise security technologies and principles.

GK# 7895 Vendor# M40367A

Course Overview


In this course, you will be introduced to security concepts for today's business and technology professionals. You will cover layered security philosophy, physical security, Internet security, and wireless security principles. You will focus on operating system security, network security, and security software. The course is designed to help you prepare for Microsoft Technology Associate (MTA) Exam: 98-367 - Security Fundamentals, which can be taken outside of the course.


  • Delivery Format:
  • Date:
  • Location:
  • Access Period:


Class is Full
This session is full. Please select a different session.

What You'll Learn

  • Offensive and defensive security strategies and approaches
  • Implement security in layers ranging from physical security, network security, and operating system security
  • Secure authentication, access-control on file systems, and password policies for users
  • Use Network Access Protection (NAP), firewalls, and protocol security for data in-flight
  • Use security software as counter-measures, including anti-virus software, anti-spam software, and encryption


Viewing outline for:

Virtual Classroom Live Outline

1. Security Layers

  • Security Fundamentals
  • Physical Security as the First Line of Defense
  • Core Security Principles
  • Physical Security

2. Authentication, Authorization, and Accounting

  • Authentication
  • Rights and Permissions
  • Auditing
  • Encryption
  • User Authentication
  • Audit Policies

3. Security Policies

  • Using Password Policies to Enhance Security

4. Network Security

  • Using Dedicated Firewalls to Protect a Network
  • Controlling Access with Network Access Protection (NAP)
  • Using Isolation to Protect the Network
  • Protecting Data with Protocol Security
  • Securing a Wireless Network
  • Network Isolation
  • Protocol Security
  • Wireless Security

5. Protecting the Server and Client

  • Protecting a Computer from Malware
  • Protecting the Client Computer
  • Protecting E-Mail
  • Protecting a Server
  • Securing Internet Explorer



General understanding and familiarity of IT business environments is beneficial

Who Should Attend


IT management, project managers, compliance personnel, business analysts, or anyone who requires a basic understanding of core security concepts and their application in a private or public sector setting.

Course Delivery

This course is available in the following formats:

Virtual Classroom Live

Experience live, expert-led online training from the convenience of your home, office or anywhere with an internet connection.

Duration: 3 day

Request this course in a different delivery format.