Scroll to top button

MTA - Security Fundamentals Course & Labs

ISBN : 9781616915810

Gain hands-on expertise in Microsoft 98-367 certification exam by 98-367 - Microsoft MTA - Security Fundamentals course and performance-based labs. Performance based labs simulate real-world, hardware, software & command line interface environments and can be mapped to any text-book, course & training. 98-367 - Microsoft MTA - Security Fundamentals certification program validates the skills and expertise of a candidate required for understanding security layers, operating system security, network security, and security software.

The MTA: Security Fundamentals is a standalone certification from Microsoft with the exam code 98-367. This certification is targeted to those professionals who want to prove their caliber in fundamental concepts of security and management.

Lessons
Lessons
13+
Exercises
255+
Quizzes
85+
Flashcards
108+
Glossary of terms
108+
TestPrep
Pre Assessment Questions
44+
Full Length Tests
5+
Post Assessment Questions
45+
Lab
Performance lab
68+
Video tutorials
50+
Minutes
44+
LiveLab (Add-on Component)
livelab
18+
Video tutorials
50+
Minutes
44+

Videos and How To

uCertify course includes videos to help understand concepts. It also includes How Tos that help learners with how to accomplish certain tasks.

Video Lessons
Videos
28+
Minutes
22+
  • Overview
  • Understanding Risk
  • Exploring the Security Triad
  • Implementing a Defense-in-Depth Security Strategy
  • Enforcing the Principle of Least Privilege
  • Hardening a Server
  • Review Questions
  • Overview
  • Comparing Malware
  • Protecting Against Malware
  • Thwarting Social-Engineering Attacks
  • Protecting Email
  • Review Questions
  • Overview
  • Comparing the Three Factors of Authentication
  • Using Passwords for Authentication
  • Using Smart Cards and Token Devices for Authentication
  • Using Biometrics for Authentication
  • Starting Applications with Run As Administrator
  • Preventing Time Skew with Kerberos
  • Identifying RADIUS Capabilities
  • Identifying Unsecure Authentication Protocols
  • Review Questions
  • Overview
  • Comparing NTFS Permissions
  • Exploring Share Permissions
  • Identifying Active Directory Permissions
  • Assigning Registry Permissions
  • Review Questions
  • Overview
  • Exploring Audit Policies
  • Enabling Auditing
  • Viewing Audit Information
  • Managing Security Logs
  • Auditing a Network with MBSA
  • Review Questions
  • Overview
  • Understanding User Account Control
  • Keeping Systems Updated
  • Protecting Clients
  • Protecting Servers
  • Exploring DNS Security Issues
  • Review Questions
  • Overview
  • Identifying Common Attack Methods
  • Understand Network Access Protection (NAP)
  • Exploring Firewalls
  • Exploring Network Access Protection
  • Identifying Protocol Security Methods
  • Review Questions
  • Overview
  • Comparing Wireless Devices
  • Comparing Wireless Security Methods
  • Configuring Wireless Routers
  • Configuring Windows 7 for Wireless
  • Review Questions
  • Overview
  • Comparing Site Security and Computer Security
  • Using Group Policy to Enhance Computer Security
  • Exploring Mobile Device Security
  • Review Questions
  • Overview
  • Comparing Encryption Methods
  • Securing Email
  • Understanding EFS
  • Exploring BitLocker Drive Encryption
  • Review Questions
  • Overview
  • Understanding a Certificate
  • Exploring the Components of a PKI
  • Review Questions
  • Overview
  • Exploring Browser Settings
  • Comparing Security Zones
  • Using IE Tools to Identify Malicious Websites
  • Review Questions
  • Certification Objectives Map

Hands on Activities (Labs)

  • Identifying risk actions
  • Creating a security policy
  • Configuring Windows firewall settings
  • Scanning the computer
  • Identifying types of malware
  • Identifying types of viruses
  • Understanding classification of viruses
  • Scanning using Microsoft Security Essentials
  • Using Windows Malicious Software Removal Tool
  • Identifying types of authentication services
  • Adding group policy object editor
  • Identifying social engineering attacks
  • Unlocking a user account
  • Resetting a password
  • Setting a password
  • Identifying authentication protocols
  • Configuring NPS to provide RADIUS authentication
  • Configuring advanced permission of a folder
  • Disabling inheritance
  • Sharing a folder
  • Exploring sharing permissions
  • Configuring standard audit policies
  • Enabling audit policies
  • Enabling audit logon events for success and failure
  • Enabling object access auditing
  • Enabling auditing users
  • Filtering entries in Event Viewer
  • Installing MBSA
  • Running the MBSA tool
  • Modifying user account control settings
  • Configuring Windows update policy
  • Using WSUS server for updates
  • Encrypting offline files
  • Configuring software-restriction policies
  • Adding the Web Server (IIS) role
  • Installing the WDS role
  • Identifying TCP ports
  • Identifying ports and services
  • Identifying types of firewall
  • Identifying the tunnel
  • Identifying tunneling protocols
  • Identifying wireless protocols
  • Configuring Windows 7 wireless settings
  • Configuring wireless network settings
  • Identifying physical security devices
  • Modifying account policies
  • Configuring a removable storage access policy
  • Restricting access in the servers organizational unit
  • Creating OU in a Domain
  • Moving objects in OU
  • Creating a new GPO
  • Understanding sender's process of digitally signing email
  • Encrypting email
  • Verifying a digital signature
  • Encrypting a file with EFS
  • Encrypting folders and files with EFS
  • Enabling BitLocker
  • Encrypting a USB drive
  • Creating an HTTPS session
  • Viewing certificate properties
  • Deleting the browsing history
  • Resetting IE settings
  • Viewing cookies and temporary files in IE
  • Configuring pop-up blocker settings
  • Adding a website to the trusted zone
  • Configuring security zones
  • Restricting a website
  • Modifying protected mode

Hands on Activities (LiveLab)

  • Identifying risk actions
  • Creating a security policy
  • Configuring Windows firewall settings
  • Scanning the computer
  • Identifying types of malware
  • Identifying types of viruses
  • Understanding classification of viruses
  • Scanning using Microsoft Security Essentials
  • Using Windows Malicious Software Removal Tool
  • Identifying types of authentication services
  • Adding group policy object editor
  • Identifying social engineering attacks
  • Unlocking a user account
  • Resetting a password
  • Setting a password
  • Identifying authentication protocols
  • Configuring NPS to provide RADIUS authentication
  • Configuring advanced permission of a folder
  • Disabling inheritance
  • Sharing a folder
  • Exploring sharing permissions
  • Configuring standard audit policies
  • Enabling audit policies
  • Enabling audit logon events for success and failure
  • Enabling object access auditing
  • Enabling auditing users
  • Filtering entries in Event Viewer
  • Installing MBSA
  • Running the MBSA tool
  • Modifying user account control settings
  • Configuring Windows update policy
  • Using WSUS server for updates
  • Encrypting offline files
  • Configuring software-restriction policies
  • Adding the Web Server (IIS) role
  • Installing the WDS role
  • Identifying TCP ports
  • Identifying ports and services
  • Identifying types of firewall
  • Identifying the tunnel
  • Identifying tunneling protocols
  • Identifying wireless protocols
  • Configuring Windows 7 wireless settings
  • Configuring wireless network settings
  • Identifying physical security devices
  • Modifying account policies
  • Configuring a removable storage access policy
  • Restricting access in the servers organizational unit
  • Creating OU in a Domain
  • Moving objects in OU
  • Creating a new GPO
  • Understanding sender's process of digitally signing email
  • Encrypting email
  • Verifying a digital signature
  • Encrypting a file with EFS
  • Encrypting folders and files with EFS
  • Enabling BitLocker
  • Encrypting a USB drive
  • Creating an HTTPS session
  • Viewing certificate properties
  • Deleting the browsing history
  • Resetting IE settings
  • Viewing cookies and temporary files in IE
  • Configuring pop-up blocker settings
  • Adding a website to the trusted zone
  • Configuring security zones
  • Restricting a website
  • Modifying protected mode

Customer Testimonials

Funsho Arashi
best
I tried out uCertify MTA - Security Fundamentals Course & Labs a couple of days ago and it turned out to be great. The course content looks good and helps accelerate professional certification in the selected path.
Taiwo Oyewo
excellent
The course includes great, well articulated, and concise material that will help you gain knowledge. The course contains virtual labs as well. The various interactive components like quizzes, flashcards, pre and post assessments are added in the course that is strictly based on the Microsoft MTA 98-367 certification exam.
×