Scroll to top button

MTA - Security Fundamentals

ISBN : 9781616911744

Gain hands-on expertise in Microsoft Security Fundamentals: 98-367 exam with MTA Security Fundamentals course. This course focuses on the objectives covered in the 98-367 exam and provides the understanding of security layers, operating system security, network security, and security software.

The MTA: Security Fundamentals is a standalone certification from Microsoft with the exam code 98-367. This certification is targeted to those professionals who want to prove their caliber in fundamental concepts of security and management.

Glossary of terms
Pre Assessment Questions
Full Length Tests
Post Assessment Questions

Videos and How To

uCertify course includes videos to help understand concepts. It also includes How Tos that help learners with how to accomplish certain tasks.

Video Lessons
Exam related FAQs
What is the exam registration fee? USD 127
Where do I take the exam? Certiport or Pearson VUE
What is the format of the exam? Active screens, Best answers, Build list, Case study, and so on.
How many questions are asked in the exam? The exam contains 40-60 questions.
What is the duration of the exam? 45 minutes
Where can I find more information about this exam? To know more about the 98-367, click here.
Which certification covers this exam?
What are the career opportunities after passing this exam?
  • IA Technician
  • Security Engineer
  • Security Consultant
  • IT Security Specialist
  • Overview
  • Understanding Risk
  • Exploring the Security Triad
  • Implementing a Defense-in-Depth Security Strategy
  • Enforcing the Principle of Least Privilege
  • Hardening a Server
  • Review Questions
  • Overview
  • Comparing Malware
  • Protecting Against Malware
  • Thwarting Social-Engineering Attacks
  • Protecting Email
  • Review Questions
  • Overview
  • Comparing the Three Factors of Authentication
  • Using Passwords for Authentication
  • Using Smart Cards and Token Devices for Authentication
  • Using Biometrics for Authentication
  • Starting Applications with Run As Administrator
  • Preventing Time Skew with Kerberos
  • Identifying RADIUS Capabilities
  • Identifying Unsecure Authentication Protocols
  • Review Questions
  • Overview
  • Comparing NTFS Permissions
  • Exploring Share Permissions
  • Identifying Active Directory Permissions
  • Assigning Registry Permissions
  • Review Questions
  • Overview
  • Exploring Audit Policies
  • Enabling Auditing
  • Viewing Audit Information
  • Managing Security Logs
  • Auditing a Network with MBSA
  • Review Questions
  • Overview
  • Understanding User Account Control
  • Keeping Systems Updated
  • Protecting Clients
  • Protecting Servers
  • Exploring DNS Security Issues
  • Review Questions
  • Overview
  • Identifying Common Attack Methods
  • Understand Network Access Protection (NAP)
  • Exploring Firewalls
  • Exploring Network Access Protection
  • Identifying Protocol Security Methods
  • Review Questions
  • Overview
  • Comparing Wireless Devices
  • Comparing Wireless Security Methods
  • Configuring Wireless Routers
  • Configuring Windows 7 for Wireless
  • Review Questions
  • Overview
  • Comparing Site Security and Computer Security
  • Using Group Policy to Enhance Computer Security
  • Exploring Mobile Device Security
  • Review Questions
  • Overview
  • Comparing Encryption Methods
  • Securing Email
  • Understanding EFS
  • Exploring BitLocker Drive Encryption
  • Review Questions
  • Overview
  • Understanding a Certificate
  • Exploring the Components of a PKI
  • Review Questions
  • Overview
  • Exploring Browser Settings
  • Comparing Security Zones
  • Using IE Tools to Identify Malicious Websites
  • Review Questions
  • Certification Objectives Map