Skip to content
ictcLogo
  • About
  • Training
  • Learning Paths
  • Training Center
  • News
  • Contact
Menu
  • About
  • Training
  • Learning Paths
  • Training Center
  • News
  • Contact
Microsoft

Course 40367-B: Security Fundamentals: MTA Exam 98-367

  • Duration: 3 days
  • Job Role: Administrator
  • Exam: 98-367

Course 40367-B: Security Fundamentals: MTA Exam 98-367

Share This Learning Path

Need more info? Contact us

This three-day MTA Training course helps you prepare for Microsoft Technology Associate Exam 98-367, and build an understanding of these topics: Security Layers, Operating System Security, Network Security, Security Software. This course leverages the same content as found in the Microsoft Official Academic Course (MOAC) for this exam. This course is updated in support of Windows 10.

Audience Profile

The Microsoft Technology Associate (MTA) is Microsoft’s newest suite of technology certification exams that validate fundamental knowledge needed to begin building a career using Microsoft technologies. This program provides an appropriate entry point to a future career in technology and assumes some hands-on experience or training but does not assume on-the-job experience.

Prerequisites

  • There are no prerequisites for this course.

Course outline

Module 1: Understanding Security Layers
Module Overview

In this module, you will learn about the security fundamentals, physical security as the first line of defense and about threat modeling.

Lessons

Introducing Core Security Principles
Understanding Physical Security as the First Line of Defense
Performing Threat Modeling

Lab Sessions

Knowledge Assessment
Business Case Scenarios

Lab Lessons

Multiple Choice
Fill in the Blank
Matching and Identification
Build a List
Designing a Physical Security Solution
Securing a Mobile Device
Understanding Confidentiality, Integrity, and Availability
Managing Social Engineering

After completing this module, students will be able to:

Understand core security principles.
Understand physical security.

Module 2: Understanding Authentication, Authorization, and Accounting
Module Overview

In this module, you will learn about the authentication, rights and permissions, auditing and encryption.

Lessons

Starting Security with Authentication
Introducing Directory Services with Active Directory
Comparing Rights and Permissions
Understanding NTFS
Sharing Drives and Folders
Introducing the Registry
Using Encryption to Protect Data
Understanding IPsec
Introducing Smart Cards
Configuring Biometrics, Windows Hello, and Microsoft Passport
Using Auditing to Complete the Security Picture

Lab Sessions

Knowledge Assessment
Business Case Scenarios

Lab Lessons

Multiple Choice
Fill in the Blank
Understanding Biometrics
Limiting Auditing
Assigning NTFS Permissions
Using EFS

After completing this module, students will be able to:

Understand user authentication.
Understand permissions.
Understand audit policies.
Understand encryption.
Understand protocol security.

Module 3: Understanding Security Policies
Module Overview

In this module, you will learn about the how to using password policies to enhance security and protecting domain user account passwords.

Lessons

Using Password Policies to Enhance Security
Protecting Domain User Account Passwords

Lab Sessions

Knowledge Assessment
Business Case Scenarios

Lab Lessons

Multiple Choice
Fill in the Blank
Understanding Long Passwords
Using Keys and Passwords
Managing User Accounts
Configuring a Local Security Policy

After completing this module, students will be able to:

Understand password policies.

Module 4: Understanding Network Security
Module Overview

This module describes network security, including using routers, firewalls and protocols that help secure a network.

Lessons

Using Dedicated Firewalls to Protect a Network
Using Isolation to Protect the Network
Protecting Data with Protocol Security
Understanding Denial-of-Service (DoS) Attacks
Securing the Wireless Network

Lab Sessions

Knowledge Assessment
Business Case Scenarios

Lab Lessons

Multiple Choice
Fill in the Blank
Using Windows Firewall
Using a Routing Table
Using Ports
Accessing and Configuring Wireless Settings

After completing this module, students will be able to:

Understand wireless security.
Understand dedicated firewalls.
Understand network isolation.
Understand protocol security.

Module 5: Protecting the Server and Client
Module Overview

This module describes how to protecting computers, including servers from malware, explain the different types of malware and how they can enter a computer system or network.

Lessons

Protecting the Client Computer
Managing Client Security Using Windows Defender
Protecting Your Email
Securing Internet Explorer
Configuring Microsoft Edge
Protecting Your Server
Using Security Baselines
Locking Down Devices to Run Only Trusted Applications
Managing Windows Store Apps

Lab Sessions

Knowledge Assessment
Business Case Scenarios

Lab Lessons

Multiple Choice
Fill in the Blank
Enforcing Physical Security
Programming Backdoors
Configuring a Windows Defender Quarantine
Protecting Your Resources
Scanning with Microsoft Baseline Security Analyzer
Reviewing Windows Updates

After completing this module, students will be able to:

Understand internet security.
Understand encryption.
Understand malware.
Understand dedicated firewalls.
Understand client protection.
Understand email protection.
Understand server protection.

Book Your Seat​

Find Learning Paths​

  • Search Paths

  • Vendors

Latest Learning Paths​

Microsoft

Course MS-102T00-A: Microsoft 365 Administrator

  • Microsoft 365
  • Intermediate

Microsoft

Course MD-102T00-A: Microsoft 365 Endpoint Administrator

  • Microsoft 365
  • Intermediate

Microsoft

Course AZ-800T00-A: Administering Windows Server Hybrid Core Infrastructure

  • Windows
  • Intermediate

Join our community of certified professionals

Sign Up to our newsletter, and stay always up to date with latest IT certifications

About Us

ICTC is the leader in technical certification courses and exams. Our labs consist of a latest tech PCs and our instructors are certified from each vendor

Policy for the Prevention and Combating of Violence and Harassment in the Workplace.

Facebook Linkedin

Learn

View all the provided certifications and there relevant courses. Book online for a certification exam.

Explore

Contact Us

  • +30 211 500 29 00
  • info@ictc.gr
  • Lagoumitzi 24, Kallithea
ictcLogo

International Computer Training Center

  • Copyright reserved to ICTC
  • Proudly Crafted by GTP Works

Copyright reserved to ICTC. Proudly Crafted by GTP Works

Choose how to get more info...

Give as a call

211 500 2 900

Let us, call you

Send us an email

We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.OkPrivacy policy