Security Fundamentals
(SEC-FUNDA.AE1)/ISBN:978-1-64459-288-5
Lessons
5+ Lessons | 57+ Quizzes | 182+ Flashcards | 182+ Glossary of terms
TestPrep
40+ Pre Assessment Questions | 2+ Full Length Tests | 40+ Post Assessment Questions | 80+ Practice Test Questions
Hands-On Labs
36+ LiveLab | 36+ Video tutorials | 01:05+ Hours
Video Lessons
107+ Videos | 03:42+ Hours
Need guidance and support? Click here to check our Instructor Led Course.
Here's what you will learn
Download Course OutlineLessons 1: Understanding Security Layers
- Introducing Core Security Principles
- Understanding Physical Security as the First Line of Defense
- Performing Threat Modeling
- Skill Summary
- Business Case Scenarios
- Workplace Ready
Lessons 2: Understanding Authentication, Authorization, and Accounting
- Starting Security with Authentication
- Introducing Directory Services with Active Directory
- Comparing Rights and Permissions
- Understanding NTFS
- Sharing Drives and Folders
- Introducing the Registry
- Using Encryption to Protect Data
- Understanding IPsec
- Introducing Smart Cards
- Configuring Biometrics, Windows Hello, and Microsoft Passport
- Using Auditing to Complete the Security Picture
- Skill Summary
- Business Case Scenarios
- Workplace Ready
Lessons 3: Understanding Security Policies
- Using Password Policies to Enhance Security
- Protecting Domain User Account Passwords
- Skill Summary
- Business Case Scenarios
- Workplace Ready
Lessons 4: Understanding Network Security
- Using Dedicated Firewalls to Protect a Network
- Using Isolation to Protect the Network
- Protecting Data with Protocol Security
- Understanding Denial‐of‐Service (DoS) Attacks
- Securing the Wireless Network
- Skill Summary
- Business Case Scenarios
- Workplace Ready
Lessons 5: Protecting the Server and Client
- Protecting the Client Computer
- Managing Client Security Using Windows Defender
- Protecting Your Email
- Securing Internet Explorer
- Configuring Microsoft Edge
- Protecting Your Server
- Using Security Baselines
- Locking Down Devices to Run Only Trusted Applications
- Managing Windows Store Apps
- Skill Summary
- Business Case Scenarios
- Workplace Ready
Hands-on LAB Activities
Understanding Authentication, Authorization, and Accounting
- Creating OUs in a Domain
- Using a Hashing Algorithm
- Moving Objects into an OU
- Creating a GPO
- Changing NTFS Permissions on a Folder
- Copying Files
- Moving Files
- Understanding Permission Inheritance
- Using Groups to Assign Permissions
- Sharing a Folder
- Encrypting a Folder with the EFS
- Encrypting the Drive Using BitLocker
- Performing Symmetric Encryption
- Performing Asymmetric Encryption
- Creating a VPN Connection
- Configuring an IPsec Policy
- Changing the Audit Policy
- Modifying Kerberos Security Settings
Understanding Security Policies
- Configuring the Domain Password Policy
- Configuring the Account Lockout Policy
- Creating a Domain User Account
Understanding Network Security
- Scanning Ports Using Nmap
- Implementing a Packet Filter
- Using Honeypot
- Performing a SYN Flood Attack
Protecting the Server and Client
- Customizing User Account Notification Settings
- Encrypting Offline Files
- Controlling How Updates Are Applied
- Scanning Using Windows Defender
- Configuring Pop-up Blocker Settings
- Enabling IE ESC for Administrators
- Performing a Phishing Attack
- Installing DHCP Server
- Capturing Network Traffic Using Network Monitor
- Performing an MBSA Scan
- Configuring Folder Attributes