O'Reilly logo

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Microsoft Security Fundamentals MTA Exam 98-367

Video Description

Microsoft's Security Fundamentals MTA Exam 98-367 is designed for candidates who are seeking to prove their core computer and network security skills and begin to open doors of opportunity in the Information Technology space. Microsoft Technology Associate (MTA) is an introductory Microsoft certification for individuals considering a career in technology. MTA certification addresses a wide spectrum of fundamental technical concepts, assesses and validates your core technical knowledge, and enhances your technical credibility. The Security Fundamentals exam tests your broad, foundational knowledge of the various technologies and options when securing servers, workstations, and networks. In this course, Mark Long helps you to understand the core security technologies and functionalities that you need to understand. Understanding the core technologies, their functionalities, and how they fit into the big picture of implementing a security infrastructure are an excelleng first step in beginning a career in Information Technology. Mark brings over 25 years of real world experience along as he helps you learn what you need to know to prepare for the 98-367 MTA exam.

Table of Contents

  1. Welcome and Intro
    1. Welcome 00:01:32
    2. Course Overview 00:04:57
    3. Windows Server History 00:06:49
    4. MTA Certifications 00:06:20
    5. Microsoft Certifications 00:06:07
    6. Target Audience 00:07:02
    7. Course Structure 00:03:56
  2. Getting Set Up
    1. Windows Server Editions 00:04:19
    2. Getting Windows Server 2008 00:05:36
    3. System Requirements 00:06:38
    4. Installing Windows Server pt. 1 00:07:03
    5. Installing Windows Server pt. 2 00:07:24
    6. Product Key and Activation 00:06:31
    7. Administering Windows Server 00:06:23
    8. Server Manager Autolaunch 00:04:16
    9. MMC 00:05:11
    10. What is R2? 00:04:38
  3. Core Security Principles
    1. Security Basics 00:06:56
    2. Threats, Vulnerabilities, and Risk 00:06:41
    3. Confidentiality 00:05:41
    4. Integrity 00:05:21
    5. Availability 00:07:23
    6. Principle of Least Privilege 00:04:23
    7. Social Engineering 00:05:49
    8. Attack Surface 00:07:08
  4. Physical Security
    1. Site Security 00:06:48
    2. Computer Security 00:04:43
    3. Removable Devices and Drives 00:05:47
    4. Mobile Device Security 00:05:25
    5. Log on Locally 00:03:54
    6. Keyloggers 00:05:28
  5. Internet and Wireless Security
    1. Securing Browsers 00:06:41
    2. Understanding Zones pt. 1 00:06:13
    3. Understanding Zones pt. 2 00:04:48
    4. IE Enhanced Security Configuration 00:05:40
    5. Secure Websites 00:05:40
    6. Wireless Security Basics 00:06:36
    7. SSID Basics 00:04:14
    8. MAC Filtering 00:03:15
  6. Operating System Security
    1. OS Security Basics 00:04:51
    2. File Systems 00:05:02
    3. Understanding Active Directory pt. 1 00:07:04
    4. Understanding Active Directory pt. 2 00:04:41
    5. Sites, Domains & OUs pt. 1 00:07:02
    6. Sites, Domains & OUs pt. 2 00:06:11
    7. Domains and Domain Controllers 00:07:11
    8. Creating a DC pt. 1 00:05:40
    9. Creating a DC pt. 2 00:06:17
    10. Creating a DC pt. 3 00:07:04
    11. Creating a DC pt. 4 00:06:45
    12. Understanding Permissions 00:05:58
    13. Setting Permissions 00:02:31
    14. Advanced Permissions 00:03:36
    15. Understanding Groups 00:05:59
    16. Permission Inheritance 00:05:26
    17. Understanding Ownership 00:03:13
    18. User Authentication 00:04:44
    19. Multifactor Authentication 00:05:28
    20. Moving and Copying Files 00:02:48
    21. Understanding Delegation 00:03:47
    22. UAC 00:05:21
    23. Using RunAs 00:04:36
  7. Passwords
    1. Password Basics 00:03:00
    2. Group Policy Password Management 00:03:41
    3. Password Length 00:05:15
    4. Password Complexity 00:05:00
    5. Requiring Password Changes 00:04:17
    6. Account Lockout 00:04:32
  8. Auditing
    1. Auditing Basics 00:04:20
    2. Enabling Auditing 00:05:06
    3. Audited Events 00:03:58
    4. Viewing Audit Information 00:05:49
    5. Auditing Best Practices 00:03:41
  9. Understanding Encryption
    1. Understanding Encryption pt. 1 00:06:52
    2. Understanding Encryption pt. 2 00:03:01
    3. Understanding Certificates 00:06:20
    4. PKI Basics 00:07:01
    5. EFS 00:03:36
    6. Protecting EFS Keys 00:05:13
    7. BitLocker 00:06:26
  10. Network Security
    1. Understanding Firewalls 00:04:28
    2. Understanding Network Isolation 00:05:56
    3. NAT 00:05:36
    4. IPSec 00:06:25
    5. Honeypots and Honeynets 00:06:20
  11. Server Security
    1. Server Hardening 00:04:54
    2. Separation of Services 00:05:42
    3. Secure DNS 00:06:49
    4. RODCs 00:06:00
    5. MBSA 00:03:28
  12. Course Wrap Up
    1. Course Wrap Up 00:05:03
  13. About the Author
    1. About the Author 00:03:26