Security Fundamentals

Coming Soon:

This product will be available from 16-Sep-2019

Here's what you will get

Here's what you will learn

  • Introducing Core Security Principles
  • Understanding Physical Security as the First Line of Defense
  • Performing Threat Modeling
  • Skill Summary
  • Business Case Scenarios
  • Workplace Ready
  • Starting Security with Authentication
  • Introducing Directory Services with Active Directory
  • Comparing Rights and Permissions
  • Understanding NTFS
  • Sharing Drives and Folders
  • Introducing the Registry
  • Using Encryption to Protect Data
  • Understanding IPsec
  • Introducing Smart Cards
  • Configuring Biometrics, Windows Hello, and Microsoft Passport
  • Using Auditing to Complete the Security Picture
  • Skill Summary
  • Business Case Scenarios
  • Workplace Ready
  • Using Password Policies to Enhance Security
  • Protecting Domain User Account Passwords
  • Skill Summary
  • Business Case Scenarios
  • Workplace Ready
  • Using Dedicated Firewalls to Protect a Network
  • Using Isolation to Protect the Network
  • Protecting Data with Protocol Security
  • Understanding Denial‐of‐Service (DoS) Attacks
  • Securing the Wireless Network
  • Skill Summary
  • Business Case Scenarios
  • Workplace Ready
  • Protecting the Client Computer
  • Managing Client Security Using Windows Defender
  • Protecting Your Email
  • Securing Internet Explorer
  • Configuring Microsoft Edge
  • Protecting Your Server
  • Using Security Baselines
  • Locking Down Devices to Run Only Trusted Applications
  • Managing Windows Store Apps
  • Skill Summary
  • Business Case Scenarios
  • Workplace Ready

Hands on Activities (Labs)

  • Creating OUs in a Domain
  • Using a Hashing Algorithm
  • Moving Objects into an OU
  • Creating a GPO
  • Changing NTFS Permissions on a Folder
  • Copying Files
  • Moving Files
  • Understanding Permission Inheritance
  • Using Groups to Assign Permissions
  • Sharing a Folder
  • Encrypting a Folder with the EFS
  • Encrypting the Drive Using BitLocker
  • Performing Symmetric Encryption
  • Performing Asymmetric Encryption
  • Creating a VPN Connection
  • Configuring an IPsec Policy
  • Changing the Audit Policy
  • Modifying Kerberos Security Settings
  • Configuring the Domain Password Policy
  • Configuring the Account Lockout Policy
  • Creating a Domain User Account
  • Scanning Ports Using Nmap
  • Implementing a Packet Filter
  • Using Honeypot
  • Performing a SYN Flood Attack
  • Customizing User Account Notification Settings
  • Encrypting Offline Files
  • Controlling How Updates Are Applied
  • Scanning Using Windows Defender
  • Configuring Pop-up Blocker Settings
  • Enabling IE ESC for Administrators
  • Performing a Phishing Attack
  • Installing DHCP Server
  • Using Network Monitor
  • Performing an MBSA Scan
  • Configuring Folder Attributes
70 70
Security Fundamentals