Autoplay
Autocomplete
Previous Lesson
Complete and Continue
Microsoft MTA 98-367 Security Fundamentals Class & Practice Exam Bundle
Section 1: Introduction
Instructor Introduction (6:55)
Course Prerequisites (5:07)
Sharing my Microsoft MTA 98-367 Certification Certificate (1:45)
Why MTA Certifications? (6:51)
Microsoft MTA 98-367 Exam Objectives (5:24)
Level-Setting Expectations: Entry Level Certification (2:05)
Course Curriculum Overview (8:17)
Course Live Demonstrations (1:10)
Course Pre-Assessment, Section Quizzes and Practice Exams (0:45)
Section 2: MTA 98-367 Study Strategies
Study Flash Cards (1:36)
Study Timeline Calculator & Recommendations (5:18)
General Study & Exam Prep Strategies (3:50)
Section 3: Course Pre-Assessment Quiz
Course Pre-Assessment Quiz Overview (0:57)
Course Pre-Assessment Quiz
Section 4: Setting Up Your Virtualized Test Environment
Introduction (3:44)
Virtualization Requirements and Install Overview (5:58)
Downloading Operating System ISO Files (3:06)
Creating Virtualbox Virtual Machines (8:39)
Some Additional Virtual Machine Settings (6:32)
Installing Windows 10 Enterprise Operating System (11:20)
Installing Windows Server 2016 Operating System (8:06)
Installing Windows Updates (4:08)
Setting Up Our Sandbox Internal LAN (7:11)
Introduction to Active Directory (9:33)
Active Directory Installation & Configuration (9:12)
DHCP Installation & Scope Configuration (8:26)
Adding Windows 10 PC to Our Active Directory Domain (2:52)
Section 5: Domain 1 Overview: Understanding Security Layers
Domain 1 Overview (1:31)
Section 6: Domain 1 – Part 1: Understanding Core Security Principles
Section Introduction
The CIA Triad (5:59)
Authentication, Authorization, and Accounting (AAA) (4:08)
Defense in Depth (5:18)
Least Privilege (3:41)
Risk Management (18:38)
Exploring Risk and Threats (6:12)
Attack Surface Analysis (9:10)
Social Engineering (9:11)
Understanding Core Security Principles Quiz
Section 7: Domain 1 – Part 2: Understanding Physical Security
Section Introduction
Introduction to Access Control (10:20)
Physical Site Security (7:58)
Computer Equipment Physical Security (7:47)
Removable & Mobile Device Security (11:23)
Keyloggers (6:40)
Understanding Physical Security Quiz
Section 8: Domain 1 – Part 3: Understanding Internet Security
Section Introduction
Section Overview (0:53)
Live Demo: Microsoft Edge Security Settings (8:18)
Live Demo: Internet Explorer Browser Settings (19:15)
Understanding Internet Security Quiz
Section 9: Domain 1 – Part 4: Understanding Wireless Security
Section Introduction
Wireless Encryption Standards Overview (2:50)
Wireless Equivalent Privacy (WEP) (3:27)
Wi-Fi Protected Access (WPA) (2:38)
Wi-Fi Protected Access 2 (WPA2) (3:00)
Wi-Fi Protected Access 3 (WPA3) (3:54)
WPA Personal versus Enterprise Mode (3:20)
Live Demo: Wireless Router Configuration (13:03)
Understanding Wireless Security Quiz
Section 10: Domain 2 Overview: Understanding Operating System Security
Domain 2 Overview (1:30)
Section 11: Domain 2 – Part 1: Understanding User Authentication
Section Inroduction
Authentication Basics (13:36)
Physical and Virtual Smart Cards (4:25)
Remote Authentication Dial-In User Service (RADIUS) (7:46)
Live Demo: Windows Server 2016 RADIUS Server (9:50)
Live Demo: Using Run As to Perform Administrative Tasks (11:51)
Understanding User Authentication Quiz
Section 12: Domain 2 – Part 2: Understanding Permissions
Section Introduction
Basic NT File System (NTFS) Permissions (9:15)
NTFS Advanced Permissions (4:39)
NTFS Inheritance (3:40)
Permissions Behavior when Moving and Copying Files (3:40)
Share Permissions (7:16)
Active Directory Groups (7:01)
Active Directory Organizational Units (3:24)
The Registry (6:29)
Live Demo: The Registry (4:22)
Live Demo: Basic NTFS Permissions (4:04)
Live Demo: Inheritence and Changing Ownership (8:42)
Live Demo: Effective Access (2:45)
Live Demo: Advanced NTFS Permissions (2:36)
Live Demo: Network Share and NTFS Permissions (12:23)
Live Demo: Moving and Copying Files and Folders (11:18)
Live Demo: Active Directory Groups (6:58)
Live Demo: Active Directory AD OUs, Delegation and Group Policy Management (13:45)
Live Demo: Active Directory Permissions (7:25)
Understanding Permissions Quiz
Section 13: Domain 2 – Part 3: Understanding Password Policies
Section Introduction
Understanding Microsoft Password Policies (12:47)
Understanding Microsoft Account Lockout Policies (8:53)
Common Password Attack Methods (6:04)
Live Demo: Password and Account Lockout Settings Demonstration (8:37)
Understanding Password Policies Quiz
Section 14: Domain 2 – Part 4: Understanding Audit Policies
Section Introduction
Introduction to Auditing (12:15)
What Can Be Audited (10:30)
Saving and Securing Audit Information (4:17)
Auditing Best Practices and Recommendations (7:49)
Live Demo: Auditing (9:46)
Understanding Audit Policies Quiz
Section 15: Domain 2 – Part 5: Understanding Encryption
Section Introduction
Introduction to Cryptography (5:43)
Symmetric Encryption (9:08)
Asymmetric Encryption (4:38)
Hashing Algorithms (8:43)
Digital Certificates and Certificate Authorities (8:50)
Live Demo: Digital Certificates (5:19)
Email Encryption Use Cases (12:55)
Windows Encrypting File System (EFS) Overview (6:16)
Live Demo: Windows EFS (17:02)
Live Demo: Moving and Copying Files/Folders with EFS (7:01)
BitLocker and BitLocker To Go Overview (6:55)
Live Demo: BitLocker (8:09)
Software versus Hardware Based Encryption (4:29)
Security Token Devices (2:16)
Live Demo: Run Only Trusted Applications via Software Restriction Policies (2:51)
A Quick Note on VPNs
Understanding Encryption Quiz
Section 16: Domain 2 – Part 6: Understanding Malware
Section Introduction
Introduction to Malware (1:11)
Buffer Overflows (6:06)
Viruses & Polymorphic Viruses (4:54)
Worms (2:18)
Trojan Horses (2:04)
Spyware and Adware (3:34)
Ransomware (4:16)
Rootkits (4:04)
Backdoors (4:03)
Zero Day Attacks (2:30)
Understanding Malware Quiz
Section 17: Domain 3 Overview: Understanding Network Security
Domain 3 Overview (1:00)
Section 18: Domain 3 – Part 1: Understanding Dedicated Firewalls
Section Introduction
Hardware Firewalls (10:59)
Stateful versus Stateless Firewalls (2:57)
Using Hardware versus Software Firewalls (3:29)
Live Demo: Windows Firewall (4:49)
Live Demo: Microsoft Security Compliance Manager (9:10)
Understanding Dedicated Firewalls Quiz
Section 19: Domain 3 – Part 2: Understanding Network Isolation
Section Introduction
Understanding Network Isolation (1:26)
Perimeter Networks (5:57)
Switch VLANs (5:36)
Routers (3:20)
Honeypots (2:20)
Network Address Translation (NAT) (7:09)
Virtual Private Network (VPN) (9:24)
IPSec (4:35)
VPN, IPSec and Network Isolation (1:13)
Live Demo: Server and Domain Isolation (7:15)
Understanding Network Isolation Quiz
Section 20: Domain 3 – Part 3: Understanding Protocol Security
Section Introduction
Protocol Spoofing (7:34)
Live Demo: Network Sniffing with WireShark (6:01)
Common Attack Methods (10:26)
DNSsec (2:29)
Live Demo: Enabling DNSsec on Windows Server 2016 (2:57)
Understanding Protocol Security Quiz
Section 21: Domain 4 Overview: Understanding Security Software
Domain 4 Overview (1:04)
Section 22: Domain 4 – Part 1: Understanding Client Protection
Section Introduction
User Account Control (UAC) (4:06)
Live Demo: How to Adjust UAC Settings in Windows (5:14)
Live Demo: AppLocker & Software Restriction Policies (9:22)
Live Demo: Windows Defender Antivirus (7:02)
Keeping Windows OS and Software Updated (6:42)
Live Demo: Encrypting Offline Folders (2:13)
Understanding Client Protection Quiz
Section 23: Domain 4 – Part 2: Understanding Email Protection
Section Introduction
Email Spam, Spoofing, Phishing and Pharming (14:56)
Dealing with Unwanted Emails (11:37)
Client versus Server Protection (2:13)
Understanding Email Protection Quiz
Section 24: Domain 4 – Part 3: Understanding Server Protection
Section Introduction
Server Hardening (3:50)
Separation of Services (2:26)
Keeping Servers Updated (2:13)
Secure Dynamic Domain Name System (DNS) Updates (3:10)
Live Demo: Secure Dynamic DNS (1:20)
Disabling Unsecure Authentication Protocols (2:48)
Read-Only Domain Controllers (RODC) (3:31)
Understanding Server Protection Quiz
Section 25: Scheduling & Taking Your MTA 98-367 Exam
Exam Details & Cost (3:50)
Scheduling Your Exam (6:02)
Testing Center Expectations (3:03)
Section 26: Practice Exams
Practice Exams Overview (9:02)
Practice Exam #1
Practice Exam #2
Section 27: Next Steps
Congratulations & Thank You! (1:00)
Certification Next Steps (1:11)
Removable & Mobile Device Security
Lesson content locked
If you're already enrolled,
you'll need to login
.
Enroll in Course to Unlock