Live Chat
Monday - Friday 8am - 6pm EST Chat Now
Contact Us
Monday - Friday 8am - 8pm EST 1-866-716-6688 Other Contact Options
Checkout

Cart () Loading...

    • Quantity:
    • Delivery:
    • Dates:
    • Location:

    $

MTA: Security Fundamentals

Gain a better understanding of the core enterprise security technologies and principles.

GK# 7895 Vendor# M40367A

Course Overview

TOP

In this course, you will be introduced to security concepts for today's business and technology professionals. You will cover layered security philosophy, physical security, Internet security, and wireless security principles. You will focus on operating system security, network security, and security software. The course is designed to help you prepare for Microsoft Technology Associate (MTA) Exam: 98-367 - Security Fundamentals, which can be taken outside of the course.

Schedule

TOP
  • Delivery Format:
  • Date:
  • Location:
  • Access Period:

$

What You'll Learn

TOP
  • Offensive and defensive security strategies and approaches
  • Implement security in layers ranging from physical security, network security, and operating system security
  • Secure authentication, access-control on file systems, and password policies for users
  • Use Network Access Protection (NAP), firewalls, and protocol security for data in-flight
  • Use security software as counter-measures, including anti-virus software, anti-spam software, and encryption

Outline

TOP
Viewing outline for:

Virtual Classroom Live Outline

1. Security Layers

  • Security Fundamentals
  • Physical Security as the First Line of Defense
  • Core Security Principles
  • Physical Security

2. Authentication, Authorization, and Accounting

  • Authentication
  • Rights and Permissions
  • Auditing
  • Encryption
  • User Authentication
  • Audit Policies

3. Security Policies

  • Using Password Policies to Enhance Security

4. Network Security

  • Using Dedicated Firewalls to Protect a Network
  • Controlling Access with Network Access Protection (NAP)
  • Using Isolation to Protect the Network
  • Protecting Data with Protocol Security
  • Securing a Wireless Network
  • Network Isolation
  • Protocol Security
  • Wireless Security

5. Protecting the Server and Client

  • Protecting a Computer from Malware
  • Protecting the Client Computer
  • Protecting E-Mail
  • Protecting a Server
  • Securing Internet Explorer

Prerequisites

TOP

General understanding and familiarity of IT business environments is beneficial

Who Should Attend

TOP

IT management, project managers, compliance personnel, business analysts, or anyone who requires a basic understanding of core security concepts and their application in a private or public sector setting.

Course Delivery

This course is available in the following formats:

Virtual Classroom Live

Experience expert-led online training from the convenience of your home, office or anywhere with an internet connection.

Duration: 3 day

Request this course in a different delivery format.
Enroll