Premium Features

Previous Buy now to get complete version Next
  • Home
uCertify Logo
  • login
  • Signup
    • Help & Support
    • Accessibility
    • Testimonials
  • Powered by uCertify
  • Request Demo
  • Hello GuestLogin or Signup
  • Feedback & Support
    • Support
    • Keyboard Shortcuts
    • Send Feedback
Scroll to top button

Security Fundamentals

(SEC-FUNDA.AE1) / ISBN: 978-1-64459-288-5
This course includes
Lessons
TestPrep
LiveLab
98-367-2019_pro 98-367-2019_pro
Try this course Pre-Assessment and first two Lessons free No credit card required
Are you an instructor? Teach using uCertify products
Request a free evaluation copy

Security Fundamentals

Here's what you will get

Lessons
  • 5+ Lessons
  • 57+ Quizzes
  • 182+ Flashcards
  • 182+ Glossary of terms
TestPrep
  • 40+ Pre Assessment Questions
  • 2+ Full Length Tests
  • 40+ Post Assessment Questions
  • 80+ Practice Test Questions
LiveLab
  • 36+ LiveLab
  • 36+ Video tutorials
  • 01:05+ Hours
Video Lessons
  • 107+ Videos
  • 03:42+ Hours
Here's what you will learn
Download Course Outline
Lesson 1: Understanding Security Layers
  • Introducing Core Security Principles
  • Understanding Physical Security as the First Line of Defense
  • Performing Threat Modeling
  • Skill Summary
  • Business Case Scenarios
  • Workplace Ready
Lesson 2: Understanding Authentication, Authorization, and Accounting
  • Starting Security with Authentication
  • Introducing Directory Services with Active Directory
  • Comparing Rights and Permissions
  • Understanding NTFS
  • Sharing Drives and Folders
  • Introducing the Registry
  • Using Encryption to Protect Data
  • Understanding IPsec
  • Introducing Smart Cards
  • Configuring Biometrics, Windows Hello, and Microsoft Passport
  • Using Auditing to Complete the Security Picture
  • Skill Summary
  • Business Case Scenarios
  • Workplace Ready
Lesson 3: Understanding Security Policies
  • Using Password Policies to Enhance Security
  • Protecting Domain User Account Passwords
  • Skill Summary
  • Business Case Scenarios
  • Workplace Ready
Lesson 4: Understanding Network Security
  • Using Dedicated Firewalls to Protect a Network
  • Using Isolation to Protect the Network
  • Protecting Data with Protocol Security
  • Understanding Denial‐of‐Service (DoS) Attacks
  • Securing the Wireless Network
  • Skill Summary
  • Business Case Scenarios
  • Workplace Ready
Lesson 5: Protecting the Server and Client
  • Protecting the Client Computer
  • Managing Client Security Using Windows Defender
  • Protecting Your Email
  • Securing Internet Explorer
  • Configuring Microsoft Edge
  • Protecting Your Server
  • Using Security Baselines
  • Locking Down Devices to Run Only Trusted Applications
  • Managing Windows Store Apps
  • Skill Summary
  • Business Case Scenarios
  • Workplace Ready

Hands on Activities (Live Labs)

Understanding Authentication, Authorization, and Accounting

  • Creating OUs in a Domain
  • Using a Hashing Algorithm
  • Moving Objects into an OU
  • Creating a GPO
  • Changing NTFS Permissions on a Folder
  • Copying Files
  • Moving Files
  • Understanding Permission Inheritance
  • Using Groups to Assign Permissions
  • Sharing a Folder
  • Encrypting a Folder with the EFS
  • Encrypting the Drive Using BitLocker
  • Performing Symmetric Encryption
  • Performing Asymmetric Encryption
  • Creating a VPN Connection
  • Configuring an IPsec Policy
  • Changing the Audit Policy
  • Modifying Kerberos Security Settings

Understanding Security Policies

  • Configuring the Domain Password Policy
  • Configuring the Account Lockout Policy
  • Creating a Domain User Account

Understanding Network Security

  • Scanning Ports Using Nmap
  • Implementing a Packet Filter
  • Using Honeypot
  • Performing a SYN Flood Attack

Protecting the Server and Client

  • Customizing User Account Notification Settings
  • Encrypting Offline Files
  • Controlling How Updates Are Applied
  • Scanning Using Windows Defender
  • Configuring Pop-up Blocker Settings
  • Enabling IE ESC for Administrators
  • Performing a Phishing Attack
  • Installing DHCP Server
  • Capturing Network Traffic Using Network Monitor
  • Performing an MBSA Scan
  • Configuring Folder Attributes
×
uc logo for app downloadDownload our uCertify App [lms_setting_placeholder: This filed is used to set the LMS settings.

Share with your friends and colleagues

We use cookies to enhance your experience. By continuing to visit this site you agree to our use of cookies. More information
Accept