The Microsoft Technology Associate (MTA) is Microsoft’s newest suite of technology certification exams that validate fundamental knowledge needed to begin building a career using Microsoft technologies. This program provides an appropriate entry point to a future career in technology and assumes some hands-on experience or training but does not assume on-the-job experience. This course focuses on Microsoft Security Fundamentals and which will provide you with the knowledge to pass the MTA 98-367 exam offered by Microsoft.
Course Lesson Preview Video
Take this opportunity to view lesson 6.4 Understanding Network Security.
About the Microsoft MTA Exam 98-367
Per the Microsoft website, this exam covers the following. This course is designed to meet these objectives for students to be able to sit for and pass the exam.
Understand security layers (25–30%)
Understand core security principles
Confidentiality; integrity; availability; how threat and risk impact principles; principle of least privilege; social engineering; attack surface analysis; threat modelling
Understand physical security
Site security; computer security; removable devices and drives; access control; mobile device security; keyloggers
Understand Internet security
Browser security settings; secure websites
Understand wireless security
Advantages and disadvantages of specific security types; keys; service set identifiers (SSIDs); MAC filters
Understand operating system security (35-40%)
Understand user authentication
Multifactor authentication; physical and virtual smart cards; Remote Authentication Dial-In User Service (RADIUS); biometrics; use Run As to perform administrative tasks
File system permissions; share permissions; registry; Active Directory; enable or disable inheritance; behavior when moving or copying files within the same disk or on another disk; multiple groups with different permissions; basic permissions and advanced permissions; take ownership; delegation; inheritance
Understand password policies
Password complexity; account lockout; password length; password history; time between password changes; enforce by using Group Policies; common attack methods; password reset procedures; protect domain user account passwords
Understand audit policies
Types of auditing; what can be audited; enable auditing; what to audit for specific purposes; where to save audit information; how to secure audit information
Encrypting file system (EFS); how EFS-encrypted folders impact moving/copying files; BitLocker (To Go); TPM; software-based encryption; MAIL encryption and signing and other uses; virtual private network (VPN); public key/private key; encryption algorithms; certificate properties; certificate services; PKI/certificate services infrastructure; token devices; lock down devices to run only trusted applications
Buffer overflow; viruses, polymorphic viruses; worms; Trojan horses; spyware; ransomware; adware; rootkits; backdoors; zero day attacks
Understand network security (20–25%)
Understand dedicated firewalls
Types of hardware firewalls and their characteristics; when to use a hardware firewall instead of a software firewall; stateful versus stateless firewall inspection; Security Compliance Manager; security baselines
Understand network isolation
Routing; honeypot; perimeter networks; network address translation (NAT); VPN; IPsec; server and domain isolation
Antivirus; protect against unwanted software installations; User Account Control (UAC); keep client operating system and software updated; encrypt offline folders, software restriction policies; principle of least privilege
Understand email protection
Antispam, antivirus, spoofing, phishing, and pharming; client versus server protection; Sender Policy Framework (SPF) records; PTR records
Understand server protection
Separation of services; hardening; keep server updated; secure dynamic Domain Name System (DNS) updates; disable unsecure authentication protocols; Read-Only Domain Controllers (RODC)
For complete information on this certification course, please visit the Microsoft website for details and exam pricing.
7.2 Authentication Authorization and Accounting Terms
7.3 Understanding Security Policies Terms
7.4 Understanding Network Security Terms
7.5 Locking Down Server and Client Terms
4 Hours 44 Minutes
24 Course Videos
74 Test Questions
Instructor led lectures
All ITU Courses replicate a live class experience with an instructor on screen delivering the course's theories and concepts.
These lectures are pre-recorded and available to the user 24/7. They can be repeated, rewound, fast forwarded.
Visual Demonstrations, Educational Games & Flashcards
ITU recognizes that all students do not learn alike and different delivery mediums are needed in order to
achieve success for a large student base. With that in mind, we delivery our content in a variety of different
ways to ensure that students stay engaged and productive throughout their courses.
Mobile Optimization & Progress Tracking
Our courses are optimized for all mobile devices allowing students to learn on the
go whenever they have free time. Students can access their courses from anywhere
and their progress is completely tracked and recorded.
Practice Quizzes and Exams
ITU Online's custom practice exams prepare you for your exams differently
and more effectively than the traditional exam preps on the market. Students will
have practice quizzes after each module to ensure you are confident on the topic you are learning.
World Class Learning Management System
ITU provides the next generation learning management system (LMS). An experience that combines the
feature set of traditional Learning Management Systems with advanced functionality designed to make
learning management easy and online learning engaging from the user’s perspective.