Description
Duration: 3 days
About this course
Security Fundamentals (MTA 98-367) address a wide spectrum of fundamental technical concepts, assess and validate core technical knowledge, and enhance technical credibility.
Audience Profile
Security Fundamentals (MTA 98-367) validates that a candidate has fundamental security knowledge and skills.
Learning Objectives
- Understand security layers
- Understand operating system security
- Understand network security
- Understand security software
Certification Exam
This Bootcamp is to be taken in preparation for the Security Fundamentals (MTA 98-367) Exam.
Prerequisites
Candidates are expected to have some hands-on experience with Windows Server, Windows-based networking, Active Directory, anti-malware products, firewalls, network topologies and devices, and network ports.
What’s included?
- Authorized Courseware
- Intensive Hands on Skills Development with an Experienced Subject Matter Expert
- Hands-on practice on real Servers and extended lab support 1.800.482.3172
- Examination Vouchers & Onsite Certification Testing- (excluding Adobe and PMP Boot Camps)
- Academy Code of Honor: Test Pass Guarantee
- Optional: Package for Hotel Accommodations, Lunch and Transportation
With several convenient training delivery methods offered, The Academy makes getting the training you need easy. Whether you prefer to learn in a classroom or an online live learning virtual environment, training videos hosted online, and private group classes hosted at your site. We offer expert instruction to individuals, government agencies, non-profits, and corporations. Our live classes, on-sites, and online training videos all feature certified instructors who teach a detailed curriculum and share their expertise and insights with trainees. No matter how you prefer to receive the training, you can count on The Academy for an engaging and effective learning experience.
Methods
- Instructor Led (the best training format we offer)
- Live Online Classroom – Online Instructor Led
- Self-Paced Video
Speak to an Admissions Representative for complete details
Start | Finish | Public Price | Public Enroll | Private Price | Private Enroll |
---|---|---|---|---|---|
9/23/2024 | 9/25/2024 | ||||
10/14/2024 | 10/16/2024 | ||||
11/4/2024 | 11/6/2024 | ||||
11/25/2024 | 11/27/2024 | ||||
12/16/2024 | 12/18/2024 | ||||
1/6/2025 | 1/8/2025 | ||||
1/27/2025 | 1/29/2025 | ||||
2/17/2025 | 2/19/2025 | ||||
3/10/2025 | 3/12/2025 | ||||
3/31/2025 | 4/2/2025 | ||||
4/21/2025 | 4/23/2025 | ||||
5/12/2025 | 5/14/2025 | ||||
6/2/2025 | 6/4/2025 | ||||
6/23/2025 | 6/25/2025 | ||||
7/14/2025 | 7/16/2025 | ||||
8/4/2025 | 8/6/2025 | ||||
8/25/2025 | 8/27/2025 | ||||
9/15/2025 | 9/17/2025 | ||||
10/6/2025 | 10/8/2025 | ||||
10/27/2025 | 10/29/2025 | ||||
11/17/2025 | 11/19/2025 | ||||
12/8/2025 | 12/10/2025 | ||||
12/29/2025 | 12/31/2025 | ||||
1/19/2026 | 1/21/2026 |
Curriculum
1. Understand security layers
1.1. Understand core security principles
Confidentiality; integrity; availability; how threat and risk impact principles; principle of least privilege; social engineering; attack surface analysis; threat modelling
1.2. Understand physical security
Site security; computer security; removable devices and drives; access control; mobile device security; keyloggers
1.3. Understand Internet security
Browser security settings; secure websites
1.4. Understand wireless security
Advantages and disadvantages of specific security types; keys; service set identifiers (SSIDs); MAC filters
2. Understand operating system security
2.1. Understand user authentication
Multifactor authentication; physical and virtual smart cards; Remote Authentication Dial-In User Service (RADIUS); biometrics; use Run As to perform administrative tasks
2.2. Understand permissions
File system permissions; share permissions; registry; Active Directory; enable or disable inheritance; behavior when moving or copying files within the same disk or on another disk; multiple groups with different permissions; basic permissions and advanced permissions; take ownership; delegation; inheritance
2.3. Understand password policies
Password complexity; account lockout; password length; password history; time between password changes; enforce by using Group Policies; common attack methods; password reset procedures; protect domain user account passwords
2.4. Understand audit policies
Types of auditing; what can be audited; enable auditing; what to audit for specific
purposes; where to save audit information; how to secure audit information
2.5. Understand encryption
Encrypting file system (EFS); how EFS-encrypted folders impact moving/copying files; BitLocker (To Go); TPM; software-based encryption; MAIL encryption and signing and other uses; virtual private network (VPN); public key/private key; encryption algorithms; certificate properties; certificate services; PKI/certificate services infrastructure; token devices; lock down devices to run only trusted applications
2.6. Understand malware
Buffer overflow; viruses, polymorphic viruses; worms; Trojan horses; spyware; ransomware; adware; rootkits; backdoors; zero day attacks
3. Understand network security
3.1. Understand dedicated firewalls
Types of hardware firewalls and their characteristics; when to use a hardware firewall instead of a software firewall; stateful vs. stateless firewall inspection; Security Compliance Manager; security baselines
3.2. Understand network isolation
Routing; honeypot; perimeter networks; network address translation (NAT); VPN; IPsec; server and domain isolation
3.3. Understand protocol security
Protocol spoofing; IPsec; tunnelling; DNSsec; network sniffing; denial-of-service (DoS) attacks; common attack methods
4. Understand security software
4.1. Understand client protection
Antivirus; protect against unwanted software installations; User Account Control (UAC); keep client operating system and software updated; encrypt offline folders; software restriction policies; principle of least privilege
4.2. Understand email protection
Antispam, antivirus, spoofing, phishing, and pharming; client vs. server protection; Sender Policy Framework (SPF) records; PTR records
4.3. Understand server protection
Separation of services; hardening; keep servers updated; secure dynamic Domain Name System (DNS) updates; disable unsecure authentication protocols; Read-Only Domain Controllers (RODC)