LearnKey Training

MTA Security Fundamentals (98-367) Course

MTA Security Fundamentals (98-367) Course

Back to Product Page

MTA Security Fundamentals (98-367) Course

4 Sessions -
8 Hours of Interactive Training

LearnKey's MTA Security Fundamentals course is geared toward those looking to learn basic operating system security fundamentals. This course will also prepare students to take and pass the MTA Security Fundamentals exam (98-367). The four main topics covered in this course are: security layers, operating system security, network security, and security software. This course will also improve employability prospects for those trying to gain an entry-level IT support/desktop position with some basic security knowledge requirements.

  • Gain the skill and confidence required to successfully pass the 98-367 exam
  • Test prep questions that meet all of the exam objectives
  • View your courseware online anytime, anywhere

About The Author
Jason Manibog, LearnKey’s senior instructor, has spent over 15 years in the Information Technology arena as a trainer, consultant, and courseware writer. Jason is a Microsoft Certified Trainer with multiple certifications in Microsoft, CompTIA, and Adobe. Jason brings a wealth of real-world experience and the ability to explain things in very practical, real-life like terms to any class he teaches, courseware he writes, or e-Learning courses he develops.

Session 1

Section A: Introduction

  • Course Opening; How to Study

Section B: Core Security Principles

  • Confidentiality
  • Integrity, Availability
  • Threats and Risk Impacts
  • Risk Register
  • Principle of Least Privilege
  • Social Engineering
  • Attack Surfaces, Threat Modeling

Section C: Physical Security

  • Site Security
  • Computer Security, Removable Drives
  • Access Control, Device Security

Section D: Internet Security

  • Browser Security Settings
  • Secure Websites

Section E: Wireless Security

  • Security Types
  • SSIDs, MAC Filters

Session 2

Section A: User Authentication

  • Multifactor Authentication
  • Smart Cards
  • Biometrics
  • Administrative Tasks

Section B: Permissions

  • File System Permissions
  • Share Permissions
  • Registry
  • Active Directory
  • Permission Inheritance
  • Permissions When Copying or Moving Files
  • Multiple Groups and Permissions
  • Basic and Advanced Permissions
  • Take Ownership
  • Delegation

Section C: Password Policies

  • Password Complexity
  • Password Length and History
  • Account Lockout Policies
  • Use Group Policy to Enforce Policies
  • Common Attack Methods
  • Password Reset Procedures
  • Protect Domain Passwords

Section D: Audit Policies

  • Auditing Types
  • What Can Be Audited
  • Enable Auditing
  • What to Audit
  • Save Audit Information
  • Secure Audit Information

Section E: Encryption

  • EFS
  • Moving and Copying EFS Files
  • BitLocker
  • Hardware and Software-Based Encryption
  • Mall Encryption
  • VPN
  • Public and Private Keys
  • Encryption Algorithms
  • Certificate Properties
  • Certificate Services
  • PKI
  • Token and Lockdown Devices

Section F: Malware

  • Buffer Overflow
  • Viruses, Worms, and Trojan Horses
  • Spyware, Ransomware, Adware
  • Rootkits
  • Backdoors, Zero Day Attacks

Section G: Session 2 Recap

  • Domain 2 Test Tips

Session 3

Section A: Dedicated Firewalls

  • Firewalls and Their Characteristics
  • Hardware Firewalls
  • Software Firewalls
  • Stateful and Stateless Inspection
  • Security Compliance Manager
  • Security Baselines

Section B: Network Isolation

  • Routing
  • Honeypot
  • Perimeter Networks
  • Network Address Translation
  • VPN and IPsec
  • Server and Domain Isolation

Section C: Protocol Security

  • Protocol Spoofing
  • IPsec, Tunneling and DNSSEC
  • Network Sniffing
  • DoS Attacks
  • Common Attack Methods

Section D: Session 3 Recap

  • Domain 3 Test Tips

Session 4

Section A: Client Protection

  • Antivirus
  • Unwanted Installation Protection and UAC
  • Operating System and Software Updates
  • Encrypt Offline Folders
  • Software Restriction Policies
  • Principle of Least Privilege

Section B: Understand Email Protection

  • Antispam and Antivirus
  • Spoofing, Phishing, and Pharming
  • Client and Server Protection
  • SPF Records
  • PTR Records

Section C: Server Protection

  • Separation of Services
  • Hardening
  • Keep Servers Updated
  • Secure Dynamic DNS Updates
  • Unsecure Authentication Protocols
  • Read-Only Domain Controllers

Section D: Session 4 and Course Recap

  • Domain 4 Test Tips
  • Final Test Tips
  • Conclusion