Skip to content

MTA Security Fundamentals

Essential skills to star your career in Computer Security


Graduate School of Management

Summary

Price
£1,000 inc VAT
Or £83.33/mo. for 12 months...
Study method
Online
Duration
40 hours · Self-paced
Certification
MTA: Microsoft Technology Associate
Professional certification What's this?
Additional info
  • Exam(s) / assessment(s) not included in price, and must be purchased separately
  • Tutor is available to students

Overview

MTA Security Fundamentals course is geared toward those looking to learn basic operating system security fundamentals. This course will also prepare students to take and pass the MTA Security Fundamentals exam (98-367). The four main topics covered in this course are: security layers, operating system security, network security, and security software. This course will also improve employability prospects for those trying to gain an entry-level IT support/desktop position with some basic security knowledge requirements.

Certification

MTA: Microsoft Technology Associate

Awarded by Microsoft

Description

Session 1

Section A: Introduction

  • Course Opening; How to Study

Section B: Core Security Principles

  • Confidentiality
  • Integrity, Availability
  • Threats and Risk Impacts
  • Risk Register
  • Principle of Least Privilege
  • Social Engineering
  • Attack Surfaces, Threat Modeling

Section C: Physical Security

  • Site Security
  • Computer Security, Removable Drives
  • Access Control, Device Security

Section D: Internet Security

  • Browser Security Settings
  • Secure Websites

Section E: Wireless Security

  • Security Types
  • SSIDs, MAC Filters

Session 2

Section A: User Authentication

  • Multifactor Authentication
  • Smart Cards
  • RADIUS
  • Biometrics
  • Administrative Tasks

Section B: Permissions

  • File System Permissions
  • Share Permissions
  • Registry
  • Active Directory
  • Permission Inheritance
  • Permissions When Copying or Moving Files
  • Multiple Groups and Permissions
  • Basic and Advanced Permissions
  • Take Ownership
  • Delegation

Section C: Password Policies

  • Password Complexity
  • Password Length and History
  • Account Lockout Policies
  • Use Group Policy to Enforce Policies
  • Common Attack Methods
  • Password Reset Procedures
  • Protect Domain Passwords

Section D: Audit Policies

  • Auditing Types
  • What Can Be Audited
  • Enable Auditing
  • What to Audit
  • Save Audit Information
  • Secure Audit Information

Section E: Encryption

  • EFS
  • Moving and Copying EFS Files
  • BitLocker
  • Hardware and Software-Based Encryption
  • Mall Encryption
  • VPN
  • Public and Private Keys
  • Encryption Algorithms
  • Certificate Properties
  • Certificate Services
  • PKI
  • Token and Lockdown Devices

Section F: Malware

  • Buffer Overflow
  • Viruses, Worms, and Trojan Horses
  • Spyware, Ransomware, Adware
  • Rootkits
  • Backdoors, Zero Day Attacks

Section G: Session 2 Recap

  • Domain 2 Test Tips

Session 3

Section A: Dedicated Firewalls

  • Firewalls and Their Characteristics
  • Hardware Firewalls
  • Software Firewalls
  • Stateful and Stateless Inspection
  • Security Compliance Manager
  • Security Baselines

Section B: Network Isolation

  • Routing
  • Honeypot
  • Perimeter Networks
  • Network Address Translation
  • VPN and IPsec
  • Server and Domain Isolation

Section C: Protocol Security

  • Protocol Spoofing
  • IPsec, Tunneling and DNSSEC
  • Network Sniffing
  • DoS Attacks
  • Common Attack Methods

Section D: Session 3 Recap

  • Domain 3 Test Tips

Session 4

Section A: Client Protection

  • Antivirus
  • Unwanted Installation Protection and UAC
  • Operating System and Software Updates
  • Encrypt Offline Folders
  • Software Restriction Policies
  • Principle of Least Privilege

Section B: Understand Email Protection

  • Antispam and Antivirus
  • Spoofing, Phishing, and Pharming
  • Client and Server Protection
  • SPF Records
  • PTR Records

Section C: Server Protection

  • Separation of Services
  • Hardening
  • Keep Servers Updated
  • Secure Dynamic DNS Updates
  • Unsecure Authentication Protocols
  • Read-Only Domain Controllers

Section D: Session 4 and Course Recap

  • Domain 4 Test Tips
  • Final Test Tips
  • Conclusion

Who is this course for?

If you want to pursue a career in IT Security then this course will give you all the knowledge and skills you need to get started.

Requirements

Although there are no formal pre-requisites required, a basic understanding of computers and working online would be advantageous prior to starting this course.

Career path

With this certification you can look towards entry-level Computer security careers.

Questions and answers

Currently there are no Q&As for this course. Be the first to ask a question.

Reviews

Currently there are no reviews for this course. Be the first to leave a review.

FAQs

Study method describes the format in which the course will be delivered. At Reed Courses, courses are delivered in a number of ways, including online courses, where the course content can be accessed online remotely, and classroom courses, where courses are delivered in person at a classroom venue.

CPD stands for Continuing Professional Development. If you work in certain professions or for certain companies, your employer may require you to complete a number of CPD hours or points, per year. You can find a range of CPD courses on Reed Courses, many of which can be completed online.

A regulated qualification is delivered by a learning institution which is regulated by a government body. In England, the government body which regulates courses is Ofqual. Ofqual regulated qualifications sit on the Regulated Qualifications Framework (RQF), which can help students understand how different qualifications in different fields compare to each other. The framework also helps students to understand what qualifications they need to progress towards a higher learning goal, such as a university degree or equivalent higher education award.

An endorsed course is a skills based course which has been checked over and approved by an independent awarding body. Endorsed courses are not regulated so do not result in a qualification - however, the student can usually purchase a certificate showing the awarding body's logo if they wish. Certain awarding bodies - such as Quality Licence Scheme and TQUK - have developed endorsement schemes as a way to help students select the best skills based courses for them.