NICF - MTA: Security Fundamentals

NTUC LearningHub


Course introduction

MTA is for individuals who are new to computer technology and/or have a need to validate their knowledge of fundamental concepts before moving on to more advanced IT certifications, such as Microsoft Certified Solutions Associate (MCSA), Microsoft Certified Solutions Expert (MCSE) or Microsoft Certified Solutions Developer (MCSD).This three-day MTA Training course helps you build an understanding of these topics: Security Layers, Authentication, Authorization and Accounting. Candidates will also become familiar with Security Policies, Network Security and protecting the Server and Client.

MTA is positioned to become the premier credential for individuals seeking to explore and pursue a career in technology, or augment related pursuits such as business or any other field where technology is pervasive. If youre already in a job, MTA can give you the fundamental IT knowledge you need to contribute to business and technology decisions in a more meaningful way.



Course Benefits


After completing this course, students will be able to:

  • Understand Security Layers
  • Understand Operating System Security
  • Understand Network Security
  • Understand Security Software



Course Pre-Requisites


It is required that students need to meet the following criteria:

  • Basic Computer Literacy
  • Basic PC Operating System Navigation Skills
  • Basic Internet Usage Skills



Target Audience


Anyone starting their IT career path or are looking to enhance their understanding of IT fundamentals



Course Outline


Understanding Security Layers
Introducing Security

  • Understanding Confidentiality
  • Understanding Integrity
  • Understanding Availability
  • Defining Threats and Risk Management
  • Understanding the Principle of Least Privilege
  • Understanding Attack Surface
  • Understanding Social Engineering
  • Linking Cost with Security
Looking at Physical Security as the First Line of Defense
  • Understanding Site Security
  • Understanding Computer Security (Cyber Security)
Authentication, Authorization, and Accounting
Starting Security with Authentication
  • Authenticating with What You Know
  • Authenticating with What You Own or Possess
  • Authenticating with What You Are
  • Introducing RADIUS and TACACS1
  • Using Run As
Introducing Directory Services with Active Directory
  • Looking at Domain Controllers
  • Introducing NTLM
  • Introducing Kerberos
  • Using Organizational Units
  • Looking at Objects
  • Using Groups
  • Looking at Web Server Authentication
Comparing Rights and Permissions
  • Looking at NTFS
  • Using NTFS Permissions
  • Looking at Effective NTFS Permissions
  • Copying and Moving Files
  • Using Folder and File Owners
Sharing Drives and Folders
  • Looking at Special and Administrative Shares
Introducing the Registry
  • Using Encryption to Protect Data
  • Examining Types of Encryption
  • Introducing Public Key Infrastructure
  • Encrypting Email
  • Encrypting Files with EFS
  • Encrypting Disks in Windows
Introducing IPSec
  • Encrypting with VPN Technology
Using Auditing to Complete the Security Picture

Understanding Security Policies

Using Password Policies to Enhance Security
  • Using Password Complexity to Make a Stronger Password
  • Using Account Lockout to Prevent Hacking
  • Looking at Password Length
  • Using Password History to Enforce Security
  • Setting the Time between Password Changes
  • Using Password Group Policies to Enforce Security
  • Understanding Common Attack Methods
Understanding Network Security
Using Dedicated Firewalls to Protect a Network
  • Examining Hardware Firewalls and Their Characteristics
  • Using Hardware Firewalls versus Software Firewalls
  • Using Stateful versus Stateless Inspection
Controlling Access with Network Access Protection (NAP)
  • Understanding the Purpose of NAP
  • Looking at How NAP Works
  • Examining the Requirements for NAP
Using Isolation to Protect the Network
  • Understanding Virtual LANs
  • Understanding Routing
  • Looking at Intrusion Detection and Intrusion Prevention Systems
  • Looking at Honeypots
  • Looking at DMZs
  • Understanding Network Address Translation (NAT)
  • Understanding Virtual Private Networks (VPNs)
  • Understanding Internet Protocol Security (IPsec)
  • Using Other VPN Protocols
  • Looking at Server and Domain Isolation
Protecting Data with Protocol Security
  • Understanding Tunneling
  • Using DNS Security Extensions (DNSSEC)
  • Looking at Protocol Spoofing
  • Utilizing Network Sniffing
  • Understanding Common NETWORK Attack Methods
Securing Wireless Network
  • Using Service Set Identifier (SSID)
  • Understanding Keys
  • Utilizing MAC Filters
  • Considering Pros and Cons of Specific Security Types
Protecting the Server and Client
Protecting the Client Computer
  • Protecting Your Computer from Malware
  • Utilizing Windows Updates
  • Utilizing User Account Control
  • Using Windows Firewall
  • Using Offline Files
  • Locking Down a Client Computer
Protecting Your Email
  • Dealing with Spam
  • Relaying Email
Securing Internet Explorer
  • Looking at Cookies and Privacy Settings
  • Examining Content Zones
  • Phishing and Pharming
Protecting Your Server
  • Placing the Server
  • Hardening the Server
  • Using Secure Dynamic DNS



Available Course Sessions


Please click here to stay updated on upcoming sessions.



Trainer Profile


NTUC Learninghub Pte Ltd (Executive Arm of NTUC LearningHub)

NTUC LearningHub® employs industry experienced and vendor certified instructors. These instructors are required to achieve sufficient qualifications before leading a class. In addition, we work with partners to deliver the latest course materials and computer facilities so that students can learn critical skills and prepare for the examinations.



 

Top