Home » Microsoft Security Fundamentals exam 98-367

Opleiding: Microsoft Security Fundamentals exam 98-367

Bij: OEM Office Elearning Menu

 

OEM Office Elearning Menu

P.J, Oudweg 4
1314 CH ALMERE
 

Inhoud van de cursus

Microsoft Security Fundamentals: Security Layers
start the course
recognize the characteristics of confidentiality
recognize the characteristics of integrity
recognize the characteristics of availability
distinguish risk management strategies
recognize the characteristics of the least privilege principle
identify techniques for avoiding social engineering
distinguish between the different components of attack surface
identify characteristics of site security
distinguish between the equipment used for securing computers
identify the security challenges of removable devices and drives
distinguish between the different technologies for securing mobile devices
disable local logons
identify characteristics of keyloggers
configure browser settings
configure Internet zones
recognize characteristics of secure sites
distinguish characteristics of different security types
distinguish between different key options
identify security considerations of a service set identifier,SSID
recognize benefits of MAC filters
recognize core security principles
Microsoft Security Fundamentals: Operating System Security
start the course
recognize characteristics of authentication
distinguish between different authentication methods
recognize characteristics of RADIUS authentication
identify characteristics of PKI
use Run As to perform administrative tasks
identify best practices when establishing password reset procedures
distinguish between the types of permissions that can be applied
identify characteristics of Active Directory permissions
distinguish NTFS permission behaviors when copying and moving files
distinguish and apply share permissions
distinguish between NT file system,NTFS, and file allocation table,FAT, file systems permissions characteristics
enable and disable inheritance
set multiple groups with different permissions
set ownership and delegation permission settings
recognize password policy best practices
implement password policy settings
recognize common password attack methods
distinguish between the different auditing types
recognize auditing best practices
enable and secure audits and audit information
identify the characteristics of EFS
distinguish between different encryption methods
identify characteristics and uses of VPN and encryption algorithms
recognize certificate properties and services policy best practices
recognize characteristics of token devices
recognize characteristics of buffer overflow
distinguish between characteristics of worms, trojans, and spyware
identify the best practices when using user authentication, permissions, passwords, and encryption to secure operating systems
Microsoft Security Fundamentals: Network Security
start the course
identify the purpose of firewalls
recognize characteristics of packet filtering firewalls
recognize characteristics of circuit-level firewalls
recognize characteristics of application-level firewalls
recognize characteristics of stateful multilevel firewalls
recognize characteristics of software firewalls
identify an appropriate firewall for network protection
distinguish between stateful and stateless inspection
identify the most appropriate inspection type to use
identify the purpose of NAP
identify NAP requirements
identify characteristics of VLANs
distinguish between ways to assign hosts to VLANs
identify characteristics of routing
distinguish between the two main types of IDS/IPS
identify characteristics of honeypots
identify characteristics of DMZs
identify characteristics of NAT
identify characteristics of VPNs
identify characteristics of IPSec
identify characteristics of server and domain isolation
identify characteristics of tunneling
identify characteristics of DNSSec
identify characteristics of protocol spoofing
identify characteristics of utility network sniffing
distinguish between common attack methods
identify characteristics of common attack methods
identify best practices when using dedicated firewalls, NAP, network isolation, and protocol security to secure the network
Microsoft Security Fundamentals: Security Software
start the course
distinguish between types of malware
identify characteristics of viruses
enable and disable UAC
use Windows Update/Windows Server Update Service
encrypt offline files and folders
recognize benefits of software restriction policies
identify characteristics of spam filtering
recognize characteristics of spoofing
distinguish between phishing and pharming
identify the advantages and disadvantages of both client and server protection
describe how SPF records function
describe how PTR records function
identify separation of services best practices
recognize importance of hardening the server
recognize the benefits of ensuring that the OS and applications are kept current
use secure dynamic DNS functionality
disable unsecure authentication protocols
recognize characteristics and benefits of a read-only domain controller
describe the concept of separate management of VLAN
use MBSA
identify best practices when using security software for client, e-mail, and server protection

Toelatingseisen: wat heb je nodig?

Er is geen specifieke voorkennis vereist.

Duur van de cursus

9 uur

Bijzonderheden

Award Winning E-learning

Plaatsen / leslocaties

Heel Nederland, E-learning, Online

Algemene informatie over de cursus

Bestel deze geweldige Elearning Training Microsoft Security Fundamentals exam 98-367 online cursus, 1 jaar 24/ 7 toegang tot rijke interactieve video’s, spraak, praktijkopdrachten, voortgangsbewaking door rapportages en testen per onderwerp om de kennis direct te toetsen. Na de cursus ontvangt u een certificaat van deelname.

Duur: 9 uur
Taal: Engels
Certificaat van deelname: Ja
Online toegang: 365 dagen
Voortgangsbewaking: Ja
Award Winning E-learning: Ja
Geschikt voor mobiel: Ja

Informatie aanvragen

Gegevens aangeduid met een * zijn verplicht in te vullen.
jaar
 
resterend: tekens
 
31993 Typ de code exact over: (hoofdlettergevoelig)
 
Copyright 2009-2021 Particuliereopleidingen.nl | Algemene voorwaarden | Overzicht van onze aanbieders | Adverteren