Scroll to top button

98-367 : MTA - Security Fundamentals Course & Labs

98-367-complete
MTA - Security Fundamentals Course & Labs
ISBN : 978-1-61691-581-0
Gain hands-on expertise in Microsoft 98-367 certification exam by 98-367 - Microsoft MTA - Security Fundamentals course and performance-based labs. Performance based labs simulate real-world, hardware, software & command line interface environments and can be mapped to any text-book, course & training. 98-367 - Microsoft MTA - Security Fundamentals certification program validates the skills and expertise of a candidate required for understanding security layers, operating system security, network security, and security software.

Here's what you will get

The MTA: Security Fundamentals is a standalone certification from Microsoft with the exam code 98-367. This certification is targeted to those professionals who want to prove their caliber in fundamental concepts of security and management.

Lessons
13+
Exercises
255+
Quizzes
85+
Flashcards
108+
Glossary of terms
108+
Pre-assessment Questions
44+
Full Length Tests
5+
Post-Assessment Questions
45+
Performance based lab
68+
Video tutorials
50+
Minutes
44+
live lab
18+
Video tutorials
50+
Minutes
44+

Videos and How To..

uCertify course includes videos to help understand concepts. It also includes How Tos that help learners with how to accomplish certain tasks.

Videos
28+
Minutes
22+
Exam FAQs
What are the prerequisites for this exam? While there are no official prerequisites to take the Microsoft Technology Associate certification, both Microsoft and uCertify strongly recommend that the candidate should have knowledge of Windows Server.
What is the exam registration fee? USD 115
Where do I take the exam?

The Microsoft Security Fundamentals exam is administered by Certiport and Pearson VUE at testing centers worldwide.

  • For Certiport: Click here to find a testing center near you.
  • For Pearson VUE: Click here to find a testing center near you.
What is the format of the exam? Multiple choice questions.
How many questions are asked in the exam? The exam contains 40-60 questions.
What is the duration of the exam? 45 minutes
What is the passing score? 700

(on a scale of 0-1000)

What is the exam's retake policy?

Retake Policy for Microsoft 98-367exam is:

  • If a candidate does not achieve a passing score on an exam the first time, the candidate must wait 24 hours before retaking the exam.
  • If a candidate does not achieve a passing score the second time, the candidate must wait seven days before retaking the exam a third time.
  • A seven-day waiting period is imposed for each subsequent exam retake.
  • A candidate may not take a given exam any more than five times per year (12 months). This 12-month period starts the day of the fifth unsuccessful exam retake. The candidate is then eligible to retake the exam 12 months from that date. To take a given exam more than five times per year, a candidate must submit a request and obtain prior permission from Microsoft.
What is the validity of the certification? Microsoft Technology Associate does not expire. This certification holder is certified for life unless the vendor changes their policy. Click here for more information.
Where can I find more information about this exam? To know more about the 98-367-complete, click here.
Which certification covers this exam?
What are the career opportunities after passing this exam?
  • Security Engineer
  • Security Consultant
  • IA Technician
  • IT Security Specialist

Here's what you will learn

  • Overview
  • Understanding Risk
  • Exploring the Security Triad
  • Implementing a Defense-in-Depth Security Strategy
  • Enforcing the Principle of Least Privilege
  • Hardening a Server
  • Review Questions
  • Overview
  • Comparing Malware
  • Protecting Against Malware
  • Thwarting Social-Engineering Attacks
  • Protecting Email
  • Review Questions
  • Overview
  • Comparing the Three Factors of Authentication
  • Using Passwords for Authentication
  • Using Smart Cards and Token Devices for Authentication
  • Using Biometrics for Authentication
  • Starting Applications with Run As Administrator
  • Preventing Time Skew with Kerberos
  • Identifying RADIUS Capabilities
  • Identifying Unsecure Authentication Protocols
  • Review Questions
  • Overview
  • Comparing NTFS Permissions
  • Exploring Share Permissions
  • Identifying Active Directory Permissions
  • Assigning Registry Permissions
  • Review Questions
  • Overview
  • Exploring Audit Policies
  • Enabling Auditing
  • Viewing Audit Information
  • Managing Security Logs
  • Auditing a Network with MBSA
  • Review Questions
  • Overview
  • Understanding User Account Control
  • Keeping Systems Updated
  • Protecting Clients
  • Protecting Servers
  • Exploring DNS Security Issues
  • Review Questions
  • Overview
  • Identifying Common Attack Methods
  • Understand Network Access Protection (NAP)
  • Exploring Firewalls
  • Exploring Network Access Protection
  • Identifying Protocol Security Methods
  • Review Questions
  • Overview
  • Comparing Wireless Devices
  • Comparing Wireless Security Methods
  • Configuring Wireless Routers
  • Configuring Windows 7 for Wireless
  • Review Questions
  • Overview
  • Comparing Site Security and Computer Security
  • Using Group Policy to Enhance Computer Security
  • Exploring Mobile Device Security
  • Review Questions
  • Overview
  • Comparing Encryption Methods
  • Securing Email
  • Understanding EFS
  • Exploring BitLocker Drive Encryption
  • Review Questions
  • Overview
  • Understanding a Certificate
  • Exploring the Components of a PKI
  • Review Questions
  • Overview
  • Exploring Browser Settings
  • Comparing Security Zones
  • Using IE Tools to Identify Malicious Websites
  • Review Questions
  • Certification Objectives Map

Hands on Activities (Labs)

  • Identifying risk actions
  • Creating a security policy
  • Configuring Windows firewall settings
  • Scanning the computer
  • Identifying types of malware
  • Identifying types of viruses
  • Understanding classification of viruses
  • Scanning using Microsoft Security Essentials
  • Using Windows Malicious Software Removal Tool
  • Identifying types of authentication services
  • Adding group policy object editor
  • Identifying social engineering attacks
  • Unlocking a user account
  • Resetting a password
  • Setting a password
  • Identifying authentication protocols
  • Configuring NPS to provide RADIUS authentication
  • Configuring advanced permission of a folder
  • Disabling inheritance
  • Sharing a folder
  • Exploring sharing permissions
  • Configuring standard audit policies
  • Enabling audit policies
  • Enabling audit logon events for success and failure
  • Enabling object access auditing
  • Enabling auditing users
  • Filtering entries in Event Viewer
  • Installing MBSA
  • Running the MBSA tool
  • Modifying user account control settings
  • Configuring Windows update policy
  • Using WSUS server for updates
  • Encrypting offline files
  • Configuring software-restriction policies
  • Adding the Web Server (IIS) role
  • Installing the WDS role
  • Identifying TCP ports
  • Identifying ports and services
  • Identifying types of firewall
  • Identifying the tunnel
  • Identifying tunneling protocols
  • Identifying wireless protocols
  • Configuring Windows 7 wireless settings
  • Configuring wireless network settings
  • Identifying physical security devices
  • Modifying account policies
  • Configuring a removable storage access policy
  • Restricting access in the servers organizational unit
  • Creating OU in a Domain
  • Moving objects in OU
  • Creating a new GPO
  • Understanding sender's process of digitally signing email
  • Encrypting email
  • Verifying a digital signature
  • Encrypting a file with EFS
  • Encrypting folders and files with EFS
  • Enabling BitLocker
  • Encrypting a USB drive
  • Creating an HTTPS session
  • Viewing certificate properties
  • Deleting the browsing history
  • Resetting IE settings
  • Viewing cookies and temporary files in IE
  • Configuring pop-up blocker settings
  • Adding a website to the trusted zone
  • Configuring security zones
  • Restricting a website
  • Modifying protected mode

Hands on Activities (Live Labs)

  • Identifying risk actions
  • Creating a security policy
  • Configuring Windows firewall settings
  • Scanning the computer
  • Identifying types of malware
  • Identifying types of viruses
  • Understanding classification of viruses
  • Scanning using Microsoft Security Essentials
  • Using Windows Malicious Software Removal Tool
  • Identifying types of authentication services
  • Adding group policy object editor
  • Identifying social engineering attacks
  • Unlocking a user account
  • Resetting a password
  • Setting a password
  • Identifying authentication protocols
  • Configuring NPS to provide RADIUS authentication
  • Configuring advanced permission of a folder
  • Disabling inheritance
  • Sharing a folder
  • Exploring sharing permissions
  • Configuring standard audit policies
  • Enabling audit policies
  • Enabling audit logon events for success and failure
  • Enabling object access auditing
  • Enabling auditing users
  • Filtering entries in Event Viewer
  • Installing MBSA
  • Running the MBSA tool
  • Modifying user account control settings
  • Configuring Windows update policy
  • Using WSUS server for updates
  • Encrypting offline files
  • Configuring software-restriction policies
  • Adding the Web Server (IIS) role
  • Installing the WDS role
  • Identifying TCP ports
  • Identifying ports and services
  • Identifying types of firewall
  • Identifying the tunnel
  • Identifying tunneling protocols
  • Identifying wireless protocols
  • Configuring Windows 7 wireless settings
  • Configuring wireless network settings
  • Identifying physical security devices
  • Modifying account policies
  • Configuring a removable storage access policy
  • Restricting access in the servers organizational unit
  • Creating OU in a Domain
  • Moving objects in OU
  • Creating a new GPO
  • Understanding sender's process of digitally signing email
  • Encrypting email
  • Verifying a digital signature
  • Encrypting a file with EFS
  • Encrypting folders and files with EFS
  • Enabling BitLocker
  • Encrypting a USB drive
  • Creating an HTTPS session
  • Viewing certificate properties
  • Deleting the browsing history
  • Resetting IE settings
  • Viewing cookies and temporary files in IE
  • Configuring pop-up blocker settings
  • Adding a website to the trusted zone
  • Configuring security zones
  • Restricting a website
  • Modifying protected mode

Copyright © 2002-2017 uCertify / All Rights Reserved.