MTA: Security Fundamentals

COURSE OUTLINE:

Description

In this course, you will be introduced to security concepts for today's business and technology professionals. You will cover layered security philosophy, physical security, Internet security, and wireless security principles. You will focus on operating system security, network security, and security software. The course is designed to help you prepare for Microsoft Technology Associate (MTA) Exam: 98-367 - Security Fundamentals, which can be taken outside of the course.

Audience

IT management, project managers, compliance personnel, business analysts, or anyone who requires a basic understanding of core security concepts and their application in a private or public sector setting.

Prerequisites

General understanding and familiarity of IT business environments is beneficial

Learning Objectives

  • Offensive and defensive security strategies and approaches
  • Implement security in layers ranging from physical security, network security, and operating system security
  • Secure authentication, access-control on file systems, and password policies for users
  • Use Network Access Protection (NAP), firewalls, and protocol security for data in-flight
  • Use security software as counter-measures, including anti-virus software, anti-spam software, and encryption

1. Security Layers

  • Security Fundamentals
  • Physical Security as the First Line of Defense
  • Core Security Principles
  • Physical Security

2. Authentication, Authorization, and Accounting

  • Authentication
  • Rights and Permissions
  • Auditing
  • Encryption
  • User Authentication
  • Audit Policies

3. Security Policies

  • Using Password Policies to Enhance Security

4. Network Security

  • Using Dedicated Firewalls to Protect a Network
  • Controlling Access with Network Access Protection (NAP)
  • Using Isolation to Protect the Network
  • Protecting Data with Protocol Security
  • Securing a Wireless Network
  • Network Isolation
  • Protocol Security
  • Wireless Security

5. Protecting the Server and Client

  • Protecting a Computer from Malware
  • Protecting the Client Computer
  • Protecting E-Mail
  • Protecting a Server
  • Securing Internet Explorer