Scroll to top button

98-367 : MTA - Security Fundamentals Course & Labs

98-367-complete
MTA - Security Fundamentals Course & Labs
ISBN : 978-1-61691-581-0
Gain hands-on expertise in Microsoft 98-367 certification exam by 98-367 - Microsoft MTA - Security Fundamentals course and performance-based labs. Performance based labs simulate real-world, hardware, software & command line interface environments and can be mapped to any text-book, course & training. 98-367 - Microsoft MTA - Security Fundamentals certification program validates the skills and expertise of a candidate required for understanding security layers, operating system security, network security, and security software.

Lessons

uCertify uses content from well known publishers, instructors, and subject matter experts. They have a minimum of 15 years of experience in their fields. uCertify brings these textbooks to life. It is full of interactive activities that keep the learner engaged. uCertify brings all available learning resources for a topic in one place so that the learner can efficiently learn without going to multiple places. Challenge questions are also embedded in the chapters so learners can attempt those while they are learning about that particular topic. This helps them grasp the concepts better because they can go over it again right away which improves learning. At the end of every lesson, uCertify courses guide the learners on the path they should follow.

uCertify platform supports 50+ different types of interactive activities, connect the idea, or try it yourself lab activities embedded throughout its course. These interactive activities keep learners engaged and make learning fun.

Here's What You Get

Exercises Flashcards Quizzes Glossary

Each lesson comes with Exercises, Flashcards & Quizzes. There is no limit to the number of times learners can attempt these. Exercises come with detailed remediation, which ensures that learners are confident on the topic before proceeding. Flashcards help master the key concepts. Glossary defines the key terms.

Exercise Questions
255+
Quizzes
85+
Flashcards
108+
Glossary of terms
108+
Lessons
13+
Videos and How To..

uCertify course includes videos to help understand concepts. It also includes How Tos that help learners with how to accomplish certain tasks.

Videos
28+
Minutes
22+

Test Prep & Practice Questions

uCertify provides full length practice tests. These tests closely follow the exam objectives and are designed to simulate real exam conditions. Each course has a number of test sets consisting of hundreds of items to ensure that learners are prepared for the certification exam.

Here's What You Get

Pre-assessments Questions
44+
Full Length Tests
5+
Post-Assessments Questions
45+

Features

Full Remediation

Each question comes with detailed remediation explaining not only why an answer option is correct but also why the incorrect answer options are incorrect.

Unlimited Practice

Each test can be taken unlimited number of times until the learner feels they are prepared. Learner can review the test and read detailed remediation. Detailed test history is also available.

Learn, Test and Review Mode

Each test set comes with learn, test and review modes. In learn mode, learners will attempt a question and will get immediate feedback and complete remediation as they move on to the next question. In test mode, learners can take a timed test simulating the actual exam conditions. In review mode, learners can read through one item at a time without attempting it.

Labs

Online labs can be used to supplement training. uCertify labs are an inexpensive & safe way to explore and learn. uCertify labs are versatile - labs simulate real-world, hardware, software & command line interface environments and can be mapped to any text-book, course & training.

Here's What You Get

Performance based lab
68+
Video tutorials
50+
Minutes
44+

Hands on Activities

Understanding Core Security Principles

  • Identifying risk actions
  • Creating a security policy
  • Configuring Windows firewall settings
  • Scanning the computer

Understanding Malware and Social Engineering

  • Identifying types of malware
  • Identifying types of viruses
  • Understanding classification of viruses
  • Scanning using Microsoft Security Essentials
  • Using Windows Malicious Software Removal Tool

Understanding User Authentication

  • Identifying types of authentication services
  • Adding group policy object editor
  • Identifying social engineering attacks
  • Unlocking a user account
  • Resetting a password
  • Setting a password
  • Identifying authentication protocols
  • Configuring NPS to provide RADIUS authentication

Securing Access with Permissions

  • Configuring advanced permission of a folder
  • Disabling inheritance
  • Sharing a folder
  • Exploring sharing permissions

Using Audit Policies and Network Auditing

  • Configuring standard audit policies
  • Enabling audit policies
  • Enabling audit logon events for success and failure
  • Enabling object access auditing
  • Enabling auditing users
  • Filtering entries in Event Viewer
  • Installing MBSA
  • Running the MBSA tool

Protecting Clients and Servers

  • Modifying user account control settings
  • Configuring Windows update policy
  • Using WSUS server for updates
  • Encrypting offline files
  • Configuring software-restriction policies
  • Adding the Web Server (IIS) role
  • Installing the WDS role

Protecting a Network

  • Identifying TCP ports
  • Identifying ports and services
  • Identifying types of firewall
  • Identifying the tunnel
  • Identifying tunneling protocols

Understanding Wireless Security

  • Identifying wireless protocols
  • Configuring Windows 7 wireless settings
  • Configuring wireless network settings

Understanding Physical Security

  • Identifying physical security devices
  • Modifying account policies
  • Configuring a removable storage access policy
  • Restricting access in the servers organizational unit
  • Creating OU in a Domain
  • Moving objects in OU
  • Creating a new GPO

Enforcing Confidentiality with Encryption

  • Understanding sender's process of digitally signing email
  • Encrypting email
  • Verifying a digital signature
  • Encrypting a file with EFS
  • Encrypting folders and files with EFS
  • Enabling BitLocker
  • Encrypting a USB drive

Understanding Certificates and a PKI

  • Creating an HTTPS session
  • Viewing certificate properties

Understanding Internet Explorer Security

  • Deleting the browsing history
  • Resetting IE settings
  • Viewing cookies and temporary files in IE
  • Configuring pop-up blocker settings
  • Adding a website to the trusted zone
  • Configuring security zones
  • Restricting a website
  • Modifying protected mode

Appendix A

Live Lab

Live-Lab is an add-on component. Please select it while buying the course. It is a real computer equipment, networked together and conveniently accessible over the Internet using virtualization. A live-lab has equipment such as a computer, server, switch or router in it that a user is free to configure.

The benefits of live-labs are:

  • Exam based practical tasks
  • Real equipment, absolutely no simulations
  • Access to the latest industry technologies
  • Available anytime, anywhere on any device
  • Break and Reset functionality
  • No hardware costs

Here's What You Get

live lab
18+
Video tutorials
50+
Minutes
44+

Hands on Activities

Understanding Core Security Principles

  • Identifying risk actions
  • Creating a security policy
  • Configuring Windows firewall settings
  • Scanning the computer

Understanding Malware and Social Engineering

  • Identifying types of malware
  • Identifying types of viruses
  • Understanding classification of viruses
  • Scanning using Microsoft Security Essentials
  • Using Windows Malicious Software Removal Tool

Understanding User Authentication

  • Identifying types of authentication services
  • Adding group policy object editor
  • Identifying social engineering attacks
  • Unlocking a user account
  • Resetting a password
  • Setting a password
  • Identifying authentication protocols
  • Configuring NPS to provide RADIUS authentication

Securing Access with Permissions

  • Configuring advanced permission of a folder
  • Disabling inheritance
  • Sharing a folder
  • Exploring sharing permissions

Using Audit Policies and Network Auditing

  • Configuring standard audit policies
  • Enabling audit policies
  • Enabling audit logon events for success and failure
  • Enabling object access auditing
  • Enabling auditing users
  • Filtering entries in Event Viewer
  • Installing MBSA
  • Running the MBSA tool

Protecting Clients and Servers

  • Modifying user account control settings
  • Configuring Windows update policy
  • Using WSUS server for updates
  • Encrypting offline files
  • Configuring software-restriction policies
  • Adding the Web Server (IIS) role
  • Installing the WDS role

Protecting a Network

  • Identifying TCP ports
  • Identifying ports and services
  • Identifying types of firewall
  • Identifying the tunnel
  • Identifying tunneling protocols

Understanding Wireless Security

  • Identifying wireless protocols
  • Configuring Windows 7 wireless settings
  • Configuring wireless network settings

Understanding Physical Security

  • Identifying physical security devices
  • Modifying account policies
  • Configuring a removable storage access policy
  • Restricting access in the servers organizational unit
  • Creating OU in a Domain
  • Moving objects in OU
  • Creating a new GPO

Enforcing Confidentiality with Encryption

  • Understanding sender's process of digitally signing email
  • Encrypting email
  • Verifying a digital signature
  • Encrypting a file with EFS
  • Encrypting folders and files with EFS
  • Enabling BitLocker
  • Encrypting a USB drive

Understanding Certificates and a PKI

  • Creating an HTTPS session
  • Viewing certificate properties

Understanding Internet Explorer Security

  • Deleting the browsing history
  • Resetting IE settings
  • Viewing cookies and temporary files in IE
  • Configuring pop-up blocker settings
  • Adding a website to the trusted zone
  • Configuring security zones
  • Restricting a website
  • Modifying protected mode

Appendix A

Exam Information

The MTA: Security Fundamentals is a standalone certification from Microsoft with the exam code 98-367. This certification is targeted to those professionals who want to prove their caliber in fundamental concepts of security and management.

Prepare for the following certification

Career Prospects
  • Security Engineer
  • Security Consultant
  • IA Technician
  • IT Security Specialist
Exam FAQs
What are the prerequisites for this exam?
While there are no official prerequisites to take the Microsoft Technology Associate certification, both Microsoft and uCertify strongly recommend that the candidate should have knowledge of Windows Server.
What is the exam registration fee?
USD 115

Pricing and taxes may vary from country to country.

Where do I take the exam?

The Microsoft Security Fundamentals exam is administered by Certiport and Pearson VUE at testing centers worldwide.

  • For Certiport: Click here to find a testing center near you.
  • For Pearson VUE: Click here to find a testing center near you.
What is the format of the exam?
Multiple choice questions.
How many questions are asked in the exam?
The exam contains 40-60 questions.
What is the duration of the exam?
45 minutes
What is the passing score?
700

(on a scale of 0-1000)

What is the exam's retake policy?

Retake Policy for Microsoft 98-367exam is:

  • If a candidate does not achieve a passing score on an exam the first time, the candidate must wait 24 hours before retaking the exam.
  • If a candidate does not achieve a passing score the second time, the candidate must wait seven days before retaking the exam a third time.
  • A seven-day waiting period is imposed for each subsequent exam retake.
  • A candidate may not take a given exam any more than five times per year (12 months). This 12-month period starts the day of the fifth unsuccessful exam retake. The candidate is then eligible to retake the exam 12 months from that date. To take a given exam more than five times per year, a candidate must submit a request and obtain prior permission from Microsoft.
What is the validity of the certification?
Microsoft Technology Associate does not expire. This certification holder is certified for life unless the vendor changes their policy. Click here for more information.
Where can I find more information about this exam?
To know more about the 98-367-complete, click here.

Table of Content

Here's What you will Learn

Lesson 1: Understanding Core Security Principles

  • Overview
  • Understanding Risk
  • Exploring the Security Triad
  • Implementing a Defense-in-Depth Security Strategy
  • Enforcing the Principle of Least Privilege
  • Hardening a Server
  • Review Questions

Lesson 2: Understanding Malware and Social Engineering

  • Overview
  • Comparing Malware
  • Protecting Against Malware
  • Thwarting Social-Engineering Attacks
  • Protecting Email
  • Review Questions

Lesson 3: Understanding User Authentication

  • Overview
  • Comparing the Three Factors of Authentication
  • Using Passwords for Authentication
  • Using Smart Cards and Token Devices for Authentication
  • Using Biometrics for Authentication
  • Starting Applications with Run As Administrator
  • Preventing Time Skew with Kerberos
  • Identifying RADIUS Capabilities
  • Identifying Unsecure Authentication Protocols
  • Review Questions

Lesson 4: Securing Access with Permissions

  • Overview
  • Comparing NTFS Permissions
  • Exploring Share Permissions
  • Identifying Active Directory Permissions
  • Assigning Registry Permissions
  • Review Questions

Lesson 5: Using Audit Policies and Network Auditing

  • Overview
  • Exploring Audit Policies
  • Enabling Auditing
  • Viewing Audit Information
  • Managing Security Logs
  • Auditing a Network with MBSA
  • Review Questions

Lesson 6: Protecting Clients and Servers

  • Overview
  • Understanding User Account Control
  • Keeping Systems Updated
  • Protecting Clients
  • Protecting Servers
  • Exploring DNS Security Issues
  • Review Questions

Lesson 7: Protecting a Network

  • Overview
  • Identifying Common Attack Methods
  • Understand Network Access Protection (NAP)
  • Exploring Firewalls
  • Exploring Network Access Protection
  • Identifying Protocol Security Methods
  • Review Questions

Lesson 8: Understanding Wireless Security

  • Overview
  • Comparing Wireless Devices
  • Comparing Wireless Security Methods
  • Configuring Wireless Routers
  • Configuring Windows 7 for Wireless
  • Review Questions

Lesson 9: Understanding Physical Security

  • Overview
  • Comparing Site Security and Computer Security
  • Using Group Policy to Enhance Computer Security
  • Exploring Mobile Device Security
  • Review Questions

Lesson 10: Enforcing Confidentiality with Encryption

  • Overview
  • Comparing Encryption Methods
  • Securing Email
  • Understanding EFS
  • Exploring BitLocker Drive Encryption
  • Review Questions

Lesson 11: Understanding Certificates and a PKI

  • Overview
  • Understanding a Certificate
  • Exploring the Components of a PKI
  • Review Questions

Lesson 12: Understanding Internet Explorer Security

  • Overview
  • Exploring Browser Settings
  • Comparing Security Zones
  • Using IE Tools to Identify Malicious Websites
  • Review Questions

Lesson 13: Appendix A

  • Certification Objectives Map

Copyright © 2002-2017 uCertify / All Rights Reserved.