Microsoft MTA 98-367: Security Fundamentals | 24/7 Live Help and Live Labs included | 365 Days Access

Type de cours
Logo DiviTrain
Note du fournisseur: starstarstarstarstar_half 9,2 DiviTrain a une moyenne de 9,2 (basée sur 9 avis)

Astuce: besoin de plus d'informations sur la formation? Téléchargez la brochure!

Description

DiviTrain is originally a Dutch education company with a proven track record of 19 years providing the latest award-winning IT courses thru innovative video-based e-learning complete with live labs for practicing, our unique 24/7 live help, and 365 days access per course! These days DiviTrain provides her courses all over Europe and Africa.

Audience Profile

Candidates for this exam are seeking to prove introductory knowledge of and skills with databases, including relational databases, such as Microsoft SQL Server. It is recommended that candidates be familiar with the concepts of and have hands-on experience with the technologies described here, either by taking relevant training courses or by working with tutorials and samples available on MSDN and in Microsoft Visual Studio. Although minimal hands-on experience with the technologies is recommended, job experience is not assumed for these exams.

1. Understand security layers (25–30%)

1.1. Understand core security principles Confidentiality; integrity; availability; how thr…

Lisez la description complète ici

Foire aux questions (FAQ)

Il n'y a pour le moment aucune question fréquente sur ce produit. Si vous avez besoin d'aide ou une question, contactez notre équipe support.

Vous n'avez pas trouvé ce que vous cherchiez ? Voir aussi : Microsoft Access, Data privacy, Data management, Microsoft Azure et Google Cloud.

DiviTrain is originally a Dutch education company with a proven track record of 19 years providing the latest award-winning IT courses thru innovative video-based e-learning complete with live labs for practicing, our unique 24/7 live help, and 365 days access per course! These days DiviTrain provides her courses all over Europe and Africa.

Audience Profile

Candidates for this exam are seeking to prove introductory knowledge of and skills with databases, including relational databases, such as Microsoft SQL Server. It is recommended that candidates be familiar with the concepts of and have hands-on experience with the technologies described here, either by taking relevant training courses or by working with tutorials and samples available on MSDN and in Microsoft Visual Studio. Although minimal hands-on experience with the technologies is recommended, job experience is not assumed for these exams.

1. Understand security layers (25–30%)

1.1. Understand core security principles Confidentiality; integrity; availability; how threat and risk impact principles; the principle of least privilege; social engineering; attack surface analysis; threat modeling

1.2. Understand physical security Site security; computer security; removable devices and drives; access control; mobile device security; keyloggers

1.3. Understand Internet security Browser security settings; zones; secure websites

1.4. Understand wireless security Advantages and disadvantages of specific security types; keys; service set identifiers (SSIDs); MAC filters

2. Understand operating system security (30–35%)

2.1. Understand user authentication
Multifactor authentication; physical and virtual smart cards; Remote Authentication DialIn User Service (RADIUS); biometrics;  use Run As to perform administrative tasks; 

2.2. Understand permissions
File system permissions; share permissions; registry; Active Directory; NT file system (NTFS) versus file allocation table (FAT); enable or disable inheritance; behavior when moving or copying files within the same disk or on another disk; multiple groups with different permissions; basic permissions and advanced permissions; take ownership; delegation; inheritance

2.3. Understand password policies
Password complexity; account lockout; password length; password history; the time between password changes; enforce by using Group Policies; common attack methods; password reset procedures; protect domain user account passwords

2.4. Understand audit policies
Types of auditing; what can be audited; enable auditing; what to audit for specific purposes; where to save audit information; how to secure audit information

2.5. Understand encryption
Encrypting file system (EFS); how EFS-encrypted folders impact moving/copying files; BitLocker (To Go); TPM; software-based encryption; MAIL encryption and signing and other uses; virtual private network (VPN); public key/private key; encryption algorithms; certificate properties; certificate services; PKI/certificate services infrastructure; token devices; lock down devices to run only trusted applications

2.6. Understand malware Buffer overflow; viruses, polymorphic viruses; worms; Trojan horses; spyware; ransomware; adware; rootkits; backdoors; zero-day attacks

3. Understand network security (20–25%)

3.1. Understand dedicated firewalls

Types of hardware firewalls and their characteristics; when to use a hardware firewall instead of a software firewall; stateful vs. stateless firewall inspection; Security Compliance Manager; security baselines

3.2. Vacant

3.3. Routing; honeypot; perimeter networks; network address translation (NAT); VPN; IPsec; server and domain isolation

3.4. Understand protocol security Protocol spoofing; IPsec; tunneling; DNSsec; network sniffing; denial-of-service (DoS) attacks; common attack methods

4. Understand security software (15–20%)

4.1. Understand client protection Antivirus; protect against unwanted software installations; User Account Control (UAC); keep client operating system and software updated; encrypt offline folders; software restriction policies; the principle of least privilege

4.2. Understand email protection Antispam, antivirus, spoofing, phishing, and pharming; client vs. server protection; Sender Policy Framework (SPF) records; PTR records

4.3. Understand server protection Separation of services; hardening; keep servers updated; secure dynamic Domain Name System (DNS) updates; disable unsecure authentication protocols; Read-Only Domain Controllers (RODC

Rester à jour sur les nouveaux avi

Pas encore d'avis.

Partagez vos avis

Avez-vous participé à Programme? Partagez votre expérience et aider d'autres personnes à faire le bon choix. Pour vous remercier, nous donnerons 1,00 € à la fondation Stichting Edukans.

Il n'y a pour le moment aucune question fréquente sur ce produit. Si vous avez besoin d'aide ou une question, contactez notre équipe support.

Recevoir une brochure d'information (gratuit)

Sexe:
(optionnel)
(optionnel)
(optionnel)
(optionnel)
(optionnel)

Vous avez des questions?

(optionnel)
Nous conservons vos données personnelles dans le but de vous accompagner par email ou téléphone.
Vous pouvez trouver plus d'informations sur : Politique de confidentialité.