Microsoft Technology Associate (MTA): IT Infrastructure: 98-367: Security Fundamentals

https://www.skillsoft.com/channel/microsoft-technology-associate-mta-it-infrastructure-94d55661-2c29-11e7-83d1-dba0327abefc?certificationexam=15333 https://www.skillsoft.com/channel/microsoft-technology-associate-mta-it-infrastructure-94d55661-2c29-11e7-83d1-dba0327abefc?certificationexam=15334
  • 11 Courses | 5h 1m 57s
  • 4 Books | 21h 27m
  • Includes Lab
  • Includes Test Prep
  • 6 Courses | 5h 5m 22s
  • 5 Books | 15h 34m
Likes 42 Likes 42
 
Discover fundamental knowledge of IT network infrastructures as you prepare for the MTA: IT Infrastructure certification.

GETTING STARTED

Core Security

  • Playable
    1. 
    The Core Concept of Confidentiality
    1m 50s
    NOW PLAYING
  • Playable
    2. 
    The Core Concept of Integrity
    51s
    UP NEXT

GETTING STARTED

Device Configuration & Data Access

  • Playable
    1. 
    Microsoft Account
    3m 44s
    NOW PLAYING
  • Playable
    2. 
    Windows Control Panel
    3m 6s
    UP NEXT

COURSES INCLUDED

Core Security
One of the building blocks of successful IT security practices is a fundamental understanding of security layers. Explore some of the main core concepts in IT security.
13 videos | 33m has Assessment available Badge
Internet & Wireless Security
Explore Internet and wireless security layers, including keylogging, browser settings and zones, and SSID and MAC filters.
7 videos | 22m has Assessment available Badge
Encryption & Malware
Discover client protection practices including encryption, and explore malware concepts such as viruses, spyware, worms, and adware.
11 videos | 43m has Assessment available Badge
Authentication
One of the building blocks of successful IT security practices is a fundamental understanding of operating system security. Explore the concept of user authentication, including multifactor and RADIUS authentication.
7 videos | 26m has Assessment available Badge
Password & Audit Policies
Explore the fundamental security policies including password and audit policies.
8 videos | 31m has Assessment available Badge
Security Fundamentals: Firewalls
Discover various types of firewalls and filtering methods including packet filtering, circuit-level, application-level, and multilevel firewalls. Explore stateful vs. stateless inspections, Security Compliance Manager, and baselines.
11 videos | 25m has Assessment available Badge
Permissions
Explore the fundamental concepts of file system, registry, share, and NTFS permissions
9 videos | 41m has Assessment available Badge
Network Isolation
One of the building blocks of successful IT security practices is a fundamental understanding of network security. Discover key concepts about network isolation methods including VLANs, DMZs, VPNs, and Server and Domain isolation.
10 videos | 21m has Assessment available Badge
Protocol Security
Explore key protocol security concepts including, tunneling, protocol spoofing, network sniffing, common network attack methods.
7 videos | 16m has Assessment available Badge
Client & Email Security
Discover client protection practices, including methods for dealing with malware, anti-virus for client protection, using UAC and explore fundamental best practices for e-mail protection.
13 videos | 32m has Assessment available Badge
Server Protection
Explore the fundamental best practices for server protection including separation of services, server hardening, securing dynamic DNS updates, and Read-only Domain Controllers
6 videos | 9m has Assessment available Badge
SHOW MORE
FREE ACCESS

COURSES INCLUDED

Device Configuration & Data Access
As an IT professional, you need to be familiar with configuring Windows devices and accessing cloud-based data. Learn about Windows device configuration, including profiles, display settings, file encryption, and app updates.
14 videos | 52m has Assessment available Badge
Device Configuration & Data Storage
Increase your knowledge of Windows device configuration and cloud-based data access by learning about various storage options and file systems.
12 videos | 54m has Assessment available Badge
Implementing Permissions, Shares, & Encryption in Windows
Data security is a key component in managing Windows devices and cloud-based services. Explore security principles required for sharing data, including permissions, certificates, SSL, and public and private keys.
16 videos | 58m available Badge
Data Management & Device Security
When managing Windows devices and cloud-based services, the importance of data security cannot be underestimated. Learn about data security, including firewalls, multifactor authentication, Windows Rights Management, and biometrics.
10 videos | 36m has Assessment available Badge
Using Microsoft Cloud Services
Cloud-based systems provide businesses with increased flexibility, scalability, and productivity. Learn about Microsoft cloud-based services, as well as the essentials of working with Microsoft Azure.
15 videos | 1h 3m has Assessment available Badge
Using Microsoft Identity Management & BYOD Solutions
Increase your knowledge of cloud-based systems by learning about Azure Active Directory, Federation Services, work folders, RemoteApp, as well as BYOD Desktop virtualization, dynamic access control, and Windows Rights Management.
11 videos | 39m has Assessment available Badge
SHOW MORE
FREE ACCESS

EARN A DIGITAL BADGE WHEN YOU COMPLETE THESE COURSES

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

BOOKS INCLUDED

Book

Microsoft Windows Security: Essentials
With practical illustrations to help reinforce learning objectives, this straightforward guide offers a clear and easy-to-understand approach to Windows security risks and attacks for newcomers to the world of IT.
Book Duration 5h 45m Book Authors By Darril Gibson

Book

Security for Microsoft Windows System Administrators: Introduction to Key Information Security Concepts
Whether you are new to this profession or have been in the field a while, this book covers the basics of securing your system environment as well as security concepts and how these concepts can be implemented practically using common tools and applications.
Book Duration 2h 49m Book Authors By Derrick Rountree

Book

Windows Networking Tools: The Complete Guide to Management, Troubleshooting, and Security
Placing the proven methods of an industry veteran at your fingertips, this book explains how to use built-in Windows networking tools and third-party networking products to diagnose network problems, address performance issues, and enhance the overall security of your system and network.
Book Duration 6h 7m Book Authors By Gilbert Held

Book

Windows Server 2012 Security from End to Edge and Beyond: Architecting, Designing, Planning, and Deploying Windows Server 2012 Security Solutions
Authored by Microsoft employees who offer insider knowledge of the Windows 8 platform, this comprehensive guide discusses how to deploy Windows security technologies effectively in both the traditional datacenter and in new cloud-based solutions.
Book Duration 6h 46m Book Authors By Debra Littlejohn Shinder, Thomas W. Shinder, Yuri Diogenes
SHOW MORE
FREE ACCESS

BOOKS INCLUDED

Book

Bring Your Own Device (BYOD): The Mobile Computing Challenge
The increasing use of personal devices such as smartphones and tablets in the workplace is offering an opportunity as well as a challenge for organisations, particularly the IT department. This book examines ways to embrace the benefits, while offering advice on how to minimise the risks.
Book Duration 52m Book Authors By BCS, The Chartered Institute for IT

Book

Securely Enabling Mobility & BYOD in Organizations
Authored by EMC Proven Professionals, Knowledge Sharing articles present ideas, expertise, unique deployments, and best practices. This article highlights the security issues that may arise from Mobility and BYOD, followed by the importance of recognizing the role of Security Governance, Strategy, and Policy, and then applying best practices of technical solutions to successfully enable business user requirements.
Book Duration 24m Book Authors By Sakthivel Rajendran

Book

Security and Auditing of Smart Devices: Managing Proliferation of Confidential Data on Corporate and BYOD Devices
An essential resource for IT and Audit professionals on how to manage, secure and audit smart devices, this book provides an understanding of the technologies related to smart devices and presents a number of different methods available to address the security of them.
Book Duration 2h 46m Book Authors By Philip Chukwuma, Richard Cozart, Sajay Rai

Book

A Comprehensive Guide to Enterprise Mobility
Illustrating the technical aspects of enterprise mobility, this book provides authoritative guidance on the application of mobility solutions across various domains, including the healthcare, retail, airline, and pharmaceutical industries.
Book Duration 8h 27m Book Authors By Anoop Narayanan, Jithesh Sathyan, Navin Narayan, Shibu K V

Book

Securing Cloud and Mobility: A Practitioner's Guide
By deconstructing the terminology of cloud computing, this comprehensive book explains how to establish a secure framework within the virtualized environment and breaks down the various deployment and service models for cloud computing.
Book Duration 3h 5m Book Authors By E. Coleen Coolidge, Ian Lim, Paul Hourani
SHOW MORE
FREE ACCESS

YOU MIGHT ALSO LIKE

Likes 56 Likes 56  
Likes 53 Likes 53  
Likes 127 Likes 127