98-367: Security Fundamentals
Your Microsoft 98-367 exam is just around the corner, right? So, it's high time to find an effective preparation tool! Our training course is what you really need! This is a series of videos led by the experienced IT instructors who will provide you with a detailed overview of the 98-367 certification test. Ace your Microsoft 98-367 at the first attempt and obtain the Security Fundamentals credential with ease.
Curriculum for 98-367 Video Course
Course Introduction
Video Name | Time | |
---|---|---|
1. Welcome! | 01:22 | |
2. Why MTA Security Fundamentals? | 06:19 | |
3. Challenge: Hackers | 01:23 | |
4. Challenge Walkthrough: Hackers | 03:45 |
Video Name | Time | |
---|---|---|
1. What To Expect In This Section? | 00:40 | |
2. Core Security Principles - Part 1 | 08:56 | |
3. Core Security Principles - Part 2 | 04:59 | |
4. The Principle of Least Privilege | 10:23 | |
5. Social Engineering | 05:00 | |
6. Man-In-The-Middle Attacks - introduction part 1 | 07:13 | |
7. Man-In-The-Middle Attacks - introduction part 2 | 07:35 | |
8. A Man-In-The-Middle Attack In Action With Cain&Able | 05:42 | |
9. Microsoft Baseline Security Analyzer | 10:36 | |
10. Physical Security | 07:19 | |
11. Mobile Devices Security | 04:57 | |
12. Overview of Internet Security | 06:35 | |
13. Internet Explorer Security Zones | 07:32 | |
14. Tips That Can Help You Protect Your Privacy | 05:50 | |
15. Overview of Wireless Security | 06:24 | |
16. Let's configure a real router and access point | 10:01 | |
17. Wireless Too Slow? | 05:05 | |
18. Let's Summarize This Section | 00:18 |
Video Name | Time | |
---|---|---|
1. What To Expect In This Section? | 00:41 | |
2. User Authentication | 09:21 | |
3. Let's Check A Real Radius Server | 06:55 | |
4. Public Key Infrastucture (PKI) And Certificates | 05:51 | |
5. Certificates and how to use them | 06:48 | |
6. How To Manage Users And Passwords In Windows Server | 02:49 | |
7. NTFS Permissions | 05:26 | |
8. Shares And Permissions In Action | 10:40 | |
9. Run-as explained | 02:46 | |
10. Password Policies | 03:16 | |
11. Audit Policies | 05:34 | |
12. Bitlocker explained | 06:36 | |
13. Malware And What You Can Do About It | 04:44 | |
14. Installing and tweaking an antivirus application - a lab | 08:46 | |
15. Let's Summarize This Section | 00:18 |
Video Name | Time | |
---|---|---|
1. What To Expect In This Section? | 00:37 | |
2. Why Do We Need A Firewall? | 10:43 | |
3. Let's Check Out A Real Firewall And UTM | 08:08 | |
4. Oh no... my network is under attack!!! | 06:11 | |
5. How a firewall can stop a virus | 04:48 | |
6. Network Access Protection | 04:15 | |
7. What is a VLAN? | 06:17 | |
8. What is a DMZ? | 07:04 | |
9. A real world example of VLANs and DMZ | 05:53 | |
10. Introduction to IPSec | 07:18 | |
11. IPSec in action | 07:20 | |
12. Names Resolution. DNS concepts | 04:33 | |
13. How to use Wireshark to caputer network traffic | 04:33 | |
14. Let's Summarize This Section | 00:23 |
Video Name | Time | |
---|---|---|
1. What To Expect In This Section? | 00:17 | |
2. Client Protection | 05:01 | |
3. User Access Control | 02:52 | |
4. Email Protection | 04:31 | |
5. Phishing - examples | 04:30 | |
6. Server protection | 02:37 |
Video Name | Time | |
---|---|---|
1. More About IPsec | 08:26 | |
2. Bonus video - encryption | 04:11 | |
3. Let's Summarize Our Training | 00:51 | |
4. How to use GPOs to make your server more secure | 05:29 | |
5. Bonus video - a S2S VPN on a Cisco router | 07:37 | |
6. Bonus video - remote support tools | 03:56 | |
7. Remote VPN Access | 08:43 | |
8. The SHA1 Function is now Dead | 02:56 | |
9. More About Wireless Security | 05:35 |
Student Feedback
Similar Courses
Only Registered Members can View Training Courses
Please fill out your email address below in order to view Training Courses. Registration is Free and Easy, You Simply need to provide an email address.
Try Free Demo
Try Free Demo