Course Details

Previous Page

Microsoft Security Fundamentals: Operating System Security

Target Audience
Expected Duration
Lesson Objectives
Course Number

One of the building blocks of successful IT security practices is a fundamental understanding of operating system security. This course provides an introduction to the concept of user authentication, including multifactor and Remote Authentication Dial-In User Service (RADIUS) authentication. This course also covers key concepts of permissions, such as file, Active Directory, share, and group permissions. Finally, this course covers fundamental security policies including password and audit policies, as well as encryption and malware best practices. This course is one of a series in the Skillsoft learning path that covers the objectives for the Microsoft Security Fundamentals: MTA 98-367 exam.

Target Audience
Individuals interested in the Microsoft Security Fundamentals: MTA exam (98-367)


Expected Duration (hours)

Lesson Objectives

Microsoft Security Fundamentals: Operating System Security

  • start the course
  • recognize characteristics of authentication
  • distinguish between different authentication methods
  • recognize characteristics of RADIUS authentication
  • identify characteristics of PKI
  • use Run As to perform administrative tasks
  • identify best practices when establishing password reset procedures
  • distinguish between the types of permissions that can be applied
  • identify characteristics of Active Directory permissions
  • distinguish NTFS permission behaviors when copying and moving files
  • distinguish and apply share permissions
  • distinguish between NT file system, or NTFS, and file allocation table, or FAT, file systems permissions characteristics
  • enable and disable inheritance
  • set multiple groups with different permissions
  • set ownership and delegation permission settings
  • recognize password policy best practices
  • implement password policy settings
  • recognize common password attack methods
  • distinguish between the different auditing types
  • recognize auditing best practices
  • enable and secure audits and audit information
  • identify the characteristics of EFS
  • distinguish between different encryption methods
  • identify characteristics and uses of VPN and encryption algorithms
  • recognize certificate properties and services policy best practices
  • recognize characteristics of token devices
  • recognize characteristics of buffer overflow
  • distinguish between characteristics of worms, trojans, and spyware
  • identify the best practices when using user authentication, permissions, passwords, and encryption to secure operating systems
  • Course Number: