Course Information
FeeSee particular events - prices exclude VAT
Duration3 Day(s)
Delivery MethodInstructor-led
Scheduled DatesCurrently there are no scheduled events for this course - please contact us for information
Referral Fee£50 Amazon Voucher! - refer a friend or colleague
Related LinksN/A
MS 40367 Course Manchester Leeds Yorkshire Book Your Course Now!

Rezound provide official 40367 Security Fundamentals: Training for MTA Exam 98-367 training for Sheffield, London, Leeds, Manchester, Yorkshire and at your site in the UK.

Course Details


This three-day MTA Training course helps you prepare for Microsoft Technology Associate Exam 98-367, and build an understanding of these topics: Security Layers, Operating System Security, Network Security, Security Software. This course leverages the same content as found in the Microsoft Official Academic Course (MOAC) for this exam.

Related Certifications and Examinations

There can be many combinations for how a course's content maps to the various examinations and related certifications.

We have listed as many of the primary ones as possible and continually update our database - please contact us for further information.

Related Examinations

Related Certifications


The Microsoft Technology Associate (MTA) is Microsoft’s newest suite of technology certification exams that validate fundamental knowledge needed to begin building a career using Microsoft technologies. This program provides an appropriate entry point to a future career in technology and assumes some hands-on experience or training but does not assume on-the-job experience.

At Course Completion

After completing this course, students will be able to:

  • Understand Security Layers
  • Understand Operating System Security
  • Understand Network Security
  • Understand Security Software


Before attending this course, students should ideally have:

  • Working knowledge of Windows Server administration and networking technology


The student kit includes a comprehensive workbook and other necessary materials for this class.

Course Outline

Module 1: Understanding Security Layers

This module introduces IT security at a high level.

Lessons and Activities

  • Introducing Security
  • Understanding Confidentiality
  • Understanding Integrity
  • Understanding Availability
  • Defining Threats and Risk Management
  • Understanding the Principle of Least Privilege
  • Understanding Attack Surface
  • Understanding Social Engineering
  • Linking Cost with Security
  • Looking at Physical Security as the First Line of Defense
  • Understanding Site Security
  • Understanding Computer Security
  • Skill Summary
  • Knowledge Assessment
  • Workplace Ready

Module 2: Authentication, Authorization and Accounting

This module introduces the key concepts of Authentication, Authorization and Accounting and their related services.

Lessons and Activities

  • Starting Security with Authentication
  • Authenticating with What You Know
  • Authenticating with What You Own or Possess
  • Authenticating with What You Are
  • Introducing RADIUS and TACACS1
  • Using Run As
  • Introducing Directory Services with Active Directory
  • Looking at Domain Controllers
  • Introducing NTLM
  • Introducing Kerberos
  • Using Organizational Units
  • Looking at Objects
  • Using Groups
  • Looking at Web Server Authentication
  • Comparing Rights and Permissions
  • Looking at NTFS
  • Using NTFS Permissions
  • Looking at Effective NTFS Permissions
  • Copying and Moving Files
  • Using Folder and File Owners
  • Sharing Drives and Folders
  • Looking at Special and Administrative Shares
  • Introducing the Registry
  • Using Encryption to Protect Data
  • Examining Types of Encryption
  • Introducing Public Key Infrastructure
  • Encrypting Email
  • Encrypting Files with EFS
  • Encrypting Disks in Windows
  • Introducing IPSec
  • Encrypting with VPN Technology
  • Using Auditing to Complete the Security Picture
  • Skill Summary
  • Knowledge Assessment
  • Workplace Ready

Module 3: Understanding Security Policies

This module introduces Password Policies to enhance system protection and describes Commone Attack Methods.

Lessons and Activities

  • Using Password Policies to Enhance Security
  • Using Password Complexity to Make a Stronger Password
  • Using Account Lockout to Prevent Hacking
  • Looking at Password Length
  • Using Password History to Enforce Security
  • Setting the Time between Password Changes
  • Using Password Group Policies to Enforce Security
  • Understanding Common Attack Methods
  • Skill Summary
  • Knowledge Assessment
  • Workplace Ready

Module 4: Understanding Network Security

This module introduces concepts and services utilised to maintain security.

Lessons and Activities

  • Using Dedicated Firewalls to Protect a Network
  • Examining Hardware Firewalls and Their Characteristics
  • Using Hardware Firewalls versus Software Firewalls
  • Using Stateful versus Stateless Inspection
  • Controlling Access with Network Access Protection (NAP)
  • Understanding the Purpose of NAP
  • Looking at How NAP Works
  • Examining the Requirements for NAP
  • Using Isolation to Protect the Network
  • Understanding Virtual LANs
  • Understanding Routing
  • Looking at Intrusion Detection and Intrusion Prevention Systems
  • Looking at Honeypots
  • Looking at DMZs
  • Understanding Network Address Translation (NAT)
  • Understanding Virtual Private Networks (VPNs)
  • Understanding Internet Protocol Security (IPsec)
  • Using Other VPN Protocols
  • Looking at Server and Domain Isolation
  • Protecting Data with Protocol Security
  • Understanding Tunneling
  • Using DNS Security Extensions (DNSSEC)
  • Looking at Protocol Spoofing
  • Utilizing Network Sniffing
  • Understanding Common NETWORK Attack Methods
  • Securing Wireless Network
  • Using Service Set Identifier (SSID)
  • Understanding Keys
  • Utilizing MAC Filters
  • Considering Pros and Cons of Specific Security Types
  • Skill Summary
  • Knowledge Assessment
  • Workplace Ready

Module 5: Protecting the Server and Client

This module introduces security practices for Server and Client computers.

Lessons and Activities

  • Protecting the Client Computer
  • Protecting Your Computer from Malware
  • Utilizing Windows Updates
  • Utilizing User Account Control
  • Using Windows Firewall
  • Using Offline Files
  • Locking Down a Client Computer
  • Protecting Your Email
  • Dealing with Spam
  • Relaying Email
  • Securing Internet Explorer
  • Looking at Cookies and Privacy Settings
  • Examining Content Zones
  • Phishing and Pharming
  • Protecting Your Server
  • Placing the Server
  • Hardening the Server
  • Using Secure Dynamic DNS
  • Skill Summary
  • Knowledge Assessment
  • Workplace Ready

Copyright © + Design: Rezound Limited | MS40367 Security Fundamentals: MTA Exam 98-367 Course Sheffield Manchester Leeds Yorkshire