G-CITI Capacity Skills

Phone

+27 721 202 0596

Email

Info@g-citi.org

reception@g-citi.org

Location

268 Halt Road

Elsies River

7490

Microsoft Technology Associate Security Fundamentals 98-367

Overview
Course Outline
Microsoft MTA: Security Fundamentals. The Microsoft Security Fundamentals Exam (98-367) validates introductory security knowledge and skills and can be used to enter the workforce, or prepare students for the Microsoft Certified Solutions Associate certification.
Course Accreditation G-CITI Capacity Skills is a Authorized Certiport testing center

Contact Request

Submitting Form...

Form received.

The server encountered an error.

Tomorrows Workforce, TODAY

 

 

How we work and where we work are changing. If handled properly, the opportunities are endless. If not, productivity is sure to plummet. At G-CITI Capacity Skills, we can help you harness the latest in mobility and collaboration to allow both workforce flexibility and organizational agility.

 1. Understanding Security Layers
Understand core security principles
- Confidentiality; integrity; availability; how threat and risk impact principles; principle of least privilege; social engineering; attack surface analysis; threat modeling
Understand physical security
- Site security; computer security; removable devices and drives; access control; mobile device security; key-loggers
Understand Internet security
- Browser security settings; secure websites
Understand wireless security
- Advantages and disadvantages of specific security types; keys; service set identifiers (SSIDs); MAC filters 2. Understanding Operating Systems Security
Understand user authentication
- Multifactor authentication; physical and virtual smart cards; Remote Authentication Dial-In User Service (RADIUS); biometrics; use Run As to perform administrative tasks
Understand permissions
- File system permissions; share permissions; registry; Active Directory; enable or disable inheritance; behaviour when moving or copying files within the same disk or on another disk; multiple groups with different permissions; basic permissions and advanced permissions; take ownership; delegation; inheritance
Understand password policies
- Password complexity; account lockout; password length; password history; time between password changes; enforce by using Group Policies; common attack methods; password reset procedures; protect domain user account passwords
Understand audit policies
- Types of auditing; what can be audited; enable auditing; what to audit for specific purposes; where to save audit information; how to secure audit information
Understand encryption
- Encrypting file system (EFS); how EFS-encrypted folders impact moving/copying files; BitLocker (To Go); TPM; software-based encryption; MAIL encryption and signing and other uses; virtual private network (VPN); public key/private key; encryption algorithms; certificate properties; certificate services; PKI/certificate services infrastructure; token devices; lock down devices to run only trusted applications
Understand malware
- Buffer overflow; viruses, polymorphic viruses; worms; Trojan horses; spyware; ransomware; adware; rootkits; backdoors; zero day attacks 3. Understanding Network Security
Understand dedicated firewalls
- Types of hardware firewalls and their characteristics; when to use a hardware firewall instead of a software firewall; stateful versus stateless firewall inspection; Security Compliance Manager; security baselines
Understand network isolation
- Routing; honeypot; perimeter networks; network address translation (NAT); VPN; IPsec; server and domain isolation
Understand protocol security
- Protocol spoofing; IPsec; tunnelling; DNSsec; network sniffing; denial-of-service (DoS) attacks; common attack methods 4. Understand Security Software
Understand client protection
- Antivirus; protect against unwanted software installations; User Account Control (UAC); keep client operating system and software updated; encrypt offline folders, software restriction policies; principle of least privilege
Understand email protection
- Antispam, antivirus, spoofing, phishing and pharming; client versus server protection; Sender Policy Framework (SPF) records; PTR records
Understand server protection
- Separation of services; hardening; keep server updated; secure dynamic Domain Name System (DNS) updates; disable unsecure authentication protocols; Read-Only Domain Controllers (RODC)
Price R5400.00
Including Vat (Per Person, Includes Manual, Dataset USB Excluding Exam Voucher ) Exam Voucher Price R850.00
Duration 5 Days (09:00 - 16:00)
Instructor-Led Classes  Reach your full potential through our Instructor-Led classes combined with interactive lessons, supporting video content, practical assignments and field experience. We deliver Instructor-Led classes full time, part-time weekends and on-site.

MAIN SITE

Home

About Us

Read our Blog

Contact Us

 

GET IN TOUCH

Tel: 021 202 0596

info@g-citi.org

reception@g-citi.org

 

Directions & Map:

 

268 Halt Road

Elsies River

Cape Town

7490

QUICK LINKS

CONNECT

WITH US

© Copyright 2017 G-CITI CAMPUS  - Home | Terms and Conditions | Contact Us | About Us |