MyPage is a personalized page based on your interests.The page is customized to help you to find content that matters you the most.

I'm not curious

Microsoft MTA: Security Fundamentals

Course Summary

This is a practical course for a beginner looking to gain a baseline knowledge in the world of IT security. This practical course moves you from basic concepts right into real-world implementations, cementing new knowledge by giving you the opportunity to

  • +

    Course Syllabus

    ● Getting Started with Security Fundamentals
        ◦ Introduction to Your Instructor and the Course
    ● Introducing Security
        ◦ Introduction
        ◦ What is Security?
        ◦ Confidentiality
        ◦ Classifying Data
        ◦ Integrity
        ◦ Availability
        ◦ Defining Threats and Risk Management
        ◦ Risk Categories
        ◦ Principle of Least Privilege (PoLP)
        ◦ Ways of Implementing PoLP
        ◦ Attack Surface
        ◦ Social Engineering
        ◦ Linking Cost with Security
        ◦ What We Covered
    ● Physical Security as the First Line of Defense
        ◦ Introduction
        ◦ Site Security
        ◦ Physical Security
        ◦ What We Covered
    ● Starting Security with Authentication
        ◦ Introduction
        ◦ What is Authentication?
        ◦ Passwords: Authenticating with What You Are
        ◦ Password Pros and Cons
        ◦ Password Hashing
        ◦ Password Cracking
        ◦ Tokens: Authenticating with What You Possess
        ◦ Tokens Pros and Cons
        ◦ Smart Cards: Another Type of Token
        ◦ Biometrics: Authenticating with What You Are
        ◦ Biometrics Pros and Cons
        ◦ RADIUS and TACACS+
        ◦ Windows' RunAs Capability
        ◦ Key Terms You Should Know
        ◦ What We Covered
    ● Authentication Basics
        ◦ Introduction
        ◦ Meeting Active Directory
        ◦ Domain Controllers
        ◦ Management Tools
        ◦ NTLM
        ◦ Kerberos
        ◦ NTLM vs. Kerberos
    ● Active Directory
        ◦ Introduction
        ◦ Organizational Units
        ◦ Directory Objects and Groups
    ● Using Encryption to Protect Data
        ◦ Introduction
        ◦ What is Encryption?
        ◦ Public Key Infrastructure
        ◦ Protecting Email, Files, and Disks
        ◦ What We Covered
    ● Securing Files via NTFS
        ◦ Introduction
        ◦ Rights vs. Permissions
        ◦ Copying and Moving Files
        ◦ File and Folder Owners
        ◦ What We Covered
    ● Sharing Drives and Folders
        ◦ Introduction
        ◦ Introduction to Shares
        ◦ Share vs. File Permissions
        ◦ Special and Admin Shares
        ◦ What We Covered
    ● Introducing the Registry
        ◦ The Purpose of the Registry
        ◦ Registry Permissions and Inheritance
    ● Using IPSec
        ◦ Introduction
        ◦ What is IPSec?
        ◦ Triggers and Actions
        ◦ Virtual Private Networks (VPNs)
    ● Using Auditing
        ◦ Introduction
        ◦ The Purpose of Auditing
        ◦ Configuring Auditing
        ◦ The Audit Log
        ◦ Considerations for Windows' Native Auditing
    ● Enhancing Security via Password Policies
        ◦ Introduction
        ◦ Strong Passwords
        ◦ Passphrases
        ◦ Account Lockout
        ◦ Password Aging and History
        ◦ GPOs and Password Policies
        ◦ Understanding Common Password Attacks
    ● Managing Security via Role-Based Access Control
        ◦ Introduction
        ◦ Roles vs. Groups
        ◦ The Benefits of RBAC
        ◦ The Challenges of RBAC
    ● Using Dedicated Firewalls to Protect a Network
        ◦ Introduction

    Course Fee:
    USD 29

    Course Type:


    Course Status:



    1 - 4 hours / week

    Attended this course?

    Back to Top

    Awards & Accolades for MyTechLogy
    Winner of
    Top 100 Asia
    Finalist at SiTF Awards 2014 under the category Best Social & Community Product
    Finalist at HR Vendor of the Year 2015 Awards under the category Best Learning Management System
    Finalist at HR Vendor of the Year 2015 Awards under the category Best Talent Management Software
    Hidden Image Url

    Back to Top