Ihr Warenkorb
Keine Artikel in Ihrem Warenkorb
Microsoft Windows Sever Ausbildung Microsoft Security Fundamentals exam 98-367 E-Learning Kurs
Ausbildung Microsoft Security Fundamentals exam 98-367 E-Learning Kurs
€139,00 €159,00

Woanders günstiger?

Lass uns wissen!

+31367601019 [email protected]

Ausbildung Microsoft Security Fundamentals exam 98-367 E-Learning Kurs

|
Klicken um zu vergrößern
€139,00 €159,00 exkl. MwSt.
€161,24 €184,44 Inkl. MwSt.
  • Kaufen Sie 2 für je €155,82 und sparen Sie 2%
  • Kaufen Sie 3 für je €154,23 und sparen Sie 3%
  • Kaufen Sie 5 für je €147,87 und sparen Sie 7%
  • Kaufen Sie 10 für je €143,10 und sparen Sie 10%
  • Kaufen Sie 25 für je €135,15 und sparen Sie 15%
  • Kaufen Sie 50 für je €124,02 und sparen Sie 22%
  • Kaufen Sie 100 für je €111,30 und sparen Sie 30%
  • Kaufen Sie 200 für je €79,50 und sparen Sie 50%
Auf Lager
|
Bestellung vor 16.00 Uhr und heute starten.
Sie haben counting... stunden
  • 1 Jahr Zugang
  • Beginnen Sie noch heute
  • Teilnahmezertifikat
Informationen

Microsoft Security Fundamentals exam 98-367 E-learning

Order this great Elearning Training Microsoft Security Fundamentals exam 98-367 online course  1 year 24/7 access to rich interactive videos, voice, practice assignments, progress monitoring through reports and tests per subject to test the knowledge directly. After the course you will receive a certificate of participation..

Course content

Microsoft Security Fundamentals: Security Layers

  • start the course
  • recognize the characteristics of confidentiality
  • recognize the characteristics of integrity
  • recognize the characteristics of availability
  • distinguish risk management strategies
  • recognize the characteristics of the least privilege principle
  • identify techniques for avoiding social engineering
  • distinguish between the different components of attack surface
  • identify characteristics of site security
  • distinguish between the equipment used for securing computers
  • identify the security challenges of removable devices and drives
  • distinguish between the different technologies for securing mobile devices
  • disable local logons
  • identify characteristics of keyloggers
  • configure browser settings
  • configure Internet zones
  • recognize characteristics of secure sites
  • distinguish characteristics of different security types
  • distinguish between different key options
  • identify security considerations of a service set identifier, or SSID
  • recognize benefits of MAC filters
  • recognize core security principles

Microsoft Security Fundamentals: Operating System Security

  • start the course
  • recognize characteristics of authentication
  • distinguish between different authentication methods
  • recognize characteristics of RADIUS authentication
  • identify characteristics of PKI
  • use Run As to perform administrative tasks
  • identify best practices when establishing password reset procedures
  • distinguish between the types of permissions that can be applied
  • identify characteristics of Active Directory permissions
  • distinguish NTFS permission behaviors when copying and moving files
  • distinguish and apply share permissions
  • distinguish between NT file system, or NTFS, and file allocation table, or FAT, file systems permissions characteristics
  • enable and disable inheritance
  • set multiple groups with different permissions
  • set ownership and delegation permission settings
  • recognize password policy best practices
  • implement password policy settings
  • recognize common password attack methods
  • distinguish between the different auditing types
  • recognize auditing best practices
  • enable and secure audits and audit information
  • identify the characteristics of EFS
  • distinguish between different encryption methods
  • identify characteristics and uses of VPN and encryption algorithms
  • recognize certificate properties and services policy best practices
  • recognize characteristics of token devices
  • recognize characteristics of buffer overflow
  • distinguish between characteristics of worms, trojans, and spyware
  • identify the best practices when using user authentication, permissions, passwords, and encryption to secure operating systems

Microsoft Security Fundamentals: Network Security

  • start the course
  • identify the purpose of firewalls
  • recognize characteristics of packet filtering firewalls
  • recognize characteristics of circuit-level firewalls
  • recognize characteristics of application-level firewalls
  • recognize characteristics of stateful multilevel firewalls
  • recognize characteristics of software firewalls
  • identify an appropriate firewall for network protection
  • distinguish between stateful and stateless inspection
  • identify the most appropriate inspection type to use
  • identify the purpose of NAP
  • identify NAP requirements
  • identify characteristics of VLANs
  • distinguish between ways to assign hosts to VLANs
  • identify characteristics of routing
  • distinguish between the two main types of IDS/IPS
  • identify characteristics of honeypots
  • identify characteristics of DMZs
  • identify characteristics of NAT
  • identify characteristics of VPNs
  • identify characteristics of IPSec
  • identify characteristics of server and domain isolation
  • identify characteristics of tunneling
  • identify characteristics of DNSSec
  • identify characteristics of protocol spoofing
  • identify characteristics of utility network sniffing
  • distinguish between common attack methods
  • identify characteristics of common attack methods
  • identify best practices when using dedicated firewalls, NAP, network isolation, and protocol security to secure the network

Microsoft Security Fundamentals: Security Software

  • start the course
  • distinguish between types of malware
  • identify characteristics of viruses
  • enable and disable UAC
  • use Windows Update/Windows Server Update Service
  • encrypt offline files and folders
  • recognize benefits of software restriction policies
  • identify characteristics of spam filtering
  • recognize characteristics of spoofing
  • distinguish between phishing and pharming
  • identify the advantages and disadvantages of both client and server protection
  • describe how SPF records function
  • describe how PTR records function
  • identify separation of services best practices
  • recognize importance of hardening the server
  • recognize the benefits of ensuring that the OS and applications are kept current
  • use secure dynamic DNS functionality
  • disable unsecure authentication protocols
  • recognize characteristics and benefits of a read-only domain controller
  • describe the concept of separate management of VLAN
  • use MBSA
  • identify best practices when using security software for client, e-mail, and server protection

TestPrep 98-367 Microsoft Security Fundamentals

TestPrep 98-367 Microsoft Security Fundamentals
Product tags
Haben Sie nicht gefunden, wonach Sie suchen?
Lassen Sie uns helfen!
Eigenschaften
Produkt
Allgemeine Eigenschaften
Studiengebühr: 5 Stunden Dauer plus Übungen (variabel)
Sprache: Englisch
Online-Zugang: 1 Jahr
Teilnahmebescheinigung: Ja, nach 70% der erfolgreichen Einsätze
Fortschrittsüberwachung: Ja
Geeignet für Handys: Ja
Preisgekröntes E-Learning: Ja
Bewertungen
Durchschnitt von 0 Bewertungen
Kein Bewertungen
Lesen oder schreiben Sie einen Kommentar
Schreiben Sie eine Bewertung!




Wir benutzen Cookies nur für interne Zwecke um den Webshop zu verbessern. Ist das in Ordnung? Ja Nein Für weitere Informationen beachten Sie bitte unsere Datenschutzerklärung. »