Note: Learn more about the Microsoft Technology Associate (MTA) Security Fundamentals exam (98-367) at https://www.microsoft.com/learning/en-us/exam-98-367.aspx.
- Describe ways a security baseline can ensure that all device configuration settings are in line with the organization’s baseline metric.
- Examine methods for ensuring physical security.
- Examine the three levels for software-restriction policies.
- Explore how VLANS can protect the network.
- Identify the different ways malicious actors can spoof protocols on the network.
- List common devices that are used to protect and defend a network.
- Recognize how antivirus software protects your system against malware.
- Recognize how server and domain isolation can isolate and protect subnetworks.
- Recognize the threat of password attacks.
- Recognize the various ways to use and secure protocols, in order to minimize risk and prevent attacks.
Skill Level Intermediate
- [Lisa] Managing a network today requires a proactive approach to reduce overall risk. When taking steps to secure an organization's network, there are a few best practices that will help to keep your interconnected systems and data safe. Data is either in motion or at rest and protection is implemented in a number of different ways. Logically securing the network is not enough. We must look at the entire organization, including user policies and physical security. In this course, I'll introduce you to some of the security devices and practices used in industry today. I'll review the importance of network isolation, using protocol security, protecting the client, and limiting physical access to infrastructure devices. Hello, my name is Lisa Bock and I'm a security ambassador. If you're ready, let's lock down your network so you can minimize your risk of being a victim of a network attack. Now, let's get started.