Microsoft Technology Associate

Slides:



Advertisements
Similar presentations
Apie PC Essentials IT Essentials: PC Hardware and Software.
Advertisements

CS898T Mobile and Wireless Network Handheld Device Security By Yuan Chen July 25 th, 2005.
SAFE Blueprint and the Security Ecosystem. 2 Chapter Topics  SAFE Blueprint Overview  Achieving the Balance  Defining Customer Expectations  Design.
“Why do we need Security”  Each business has unique security and safety needs, e.g. Inventory Shrinkage and Theft Personal Safety Break Ins Moving Your.
PHYSICAL SECURITY Attacker. Physical Security Not all attacks on your organization's data come across the network. Many companies focus on an “iron-clad”
Security+ Guide to Network Security Fundamentals
Understanding Active Directory
20411D Administering Windows Server® 2012 刘道军老师主讲 如有疑问请与我联系:
Exchange 2013 and Office 365 Presented by: John Deardurff Weinstein Group Internal Sales Training 11/18/2014.
Small Business Security By Donatas Sumyla. Content Introduction Tools Symantec Corp. Company Overview Symantec.com Microsoft Company Overview Small Business.
TechEd /19/ :42 AM © 2013 Microsoft Corporation. All rights reserved. Microsoft, Windows, and other product names are or may be registered.
Microsoft Office Project Training Materials Jon Jaffe Information Worker Product Managent Group Microsoft Corporation.
Understanding Active Directory
Selling the MTA Sales Academy Brent Johnson – Oct 17, 2012.
Windows Server 2012 Certification and Training June 2012.
The Road to the Microsoft MCITP Certifications and Other Topics Networking Curriculum.
Authentication, Authorization and Accounting
Master Expert Associat e Microsoft Certified Solutions Master (MCSM) Microsoft Certified Solutions Expert (MCSE) Microsoft Certified Solutions Associate.
By Isaac Parenteau. Agenda  What is the certification?  What are the courses required for it?  Future Careers  Cost?
Christopher Chapman | MCT Content PM, Microsoft Learning, PDG Planning, Microsoft.
Module 9 Configuring Server Security Compliance. Module Overview Securing a Windows Infrastructure Overview of EFS Configuring an Audit Policy Overview.
10969A Active Directory® Services with Windows Server® Course 10699A
Storage Security and Management: Security Framework
Course ILT Course Code CSN 208 Network Security. Course ILT Course Description This course provides an in-depth study of network security issues, standards,
Understanding Security Layers
Microsoft Windows 8.1 Enterprise: A brief overview of Microsoft Windows 8 Enhancements. Welcome!
Module 0: Introduction Installing and Configuring Windows® 7 Client
Exam Prep: Microsoft Technology Associate : Networking Fundamentals.
Microsoft ® Official Course Module 8 Securing Windows 8 Desktops.
Physical Security By: Christian Hudson. Overview Definition and importance Components Layers Physical Security Briefs Zones Implementation.
System Center 2012 Certification and Training May 2012.
Module 14: Configuring Server Security Compliance
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 IT Essentials PC Hardware and Software v4.0 Pete Lawrence June 2007.
Microsoft ® Virtual Academy Module 3 Understanding Security Policies Christopher Chapman | Content PM, Microsoft Thomas Willingham | Content Developer,
What does secure mean? You have been assigned a task of finding a cloud provider who can provide a secure environment for the launch of a new web application.
20411B Administering Windows Server® B
Physical ways of keeping your system secure. Unit 7 – Assignment 2. (Task1) By, Rachel Fiveash.
Chapter 2 Securing Network Server and User Workstations.
Course 6292A Installing and Configuring Windows® 7 Client.
Microsoft Virtual Academy Preparing for the Windows 8.1 MCSA Module 5: Managing Devices & Resource Access.
Configuring, Managing and Maintaining Windows Server® 2008 Servers Course 6419A.
Physical security By Ola Abd el-latif Abbass Hassan.
Presenter Microsoft IT Academy (ITA) Overview. Agenda What is ITA? How to Request Membership Resource Dive.
Certification Overview.
Physical Security Ch9 Part I Security Methods and Practice CET4884 Principles of Information Security, Fourth Edition.
Microsoft Virtual Academy Talbott Crowell | Chief Architect, ThirdM.com Rob Latino | Program Manager in Office 365 Support, Microsoft.
Managed IT Services JND Consulting Group LLC
Windows Server 2012 Certification and Training
Physical Security at Data Center: A survey. Objective of the Survey  1. To identify the current physical security in data centre.  2.To analyse the.
Unit 1: Protecting the Facility (Virtual Machines)
Microsoft Training and Certification Guide
Module 5: Designing Physical Security for Network Resources
MTA, MCP en MCSA curriculum in de Microsoft IT Academy
HARDENING CLIENT COMPUTERS
INFORMATION SECURITY The protection of information from accidental or intentional misuse of a persons inside or outside an organization Comp 212 – Computer.
Understanding Security Layers
BUILDING A PRIVACY AND SECURITY PROGRAM FOR YOUR NON-PROFIT
Module 1: Introduction to Designing Security
Preparing Tips For CompTIA SY0-501 Final Exam | CompTIA SY0-501 Dumps PDF Dumps4download
Designing Database Solutions for SQL Server
MTA, MCP en MCSA curriculum in de Microsoft IT Academy
Understanding Security Layers
Configuring, Managing and Maintaining Windows Server® 2008 Servers Course 6419A.
Physical Security.
Module 2 OBJECTIVE 14: Compare various security mechanisms.
Welcome to all Participants
Understanding Security Policies
Preparing for the Windows 8.1 MCSA
Introduction to Course
Preparing for the Windows 8. 1 MCSA Module 6: Securing Windows 8
Presentation transcript:

Microsoft Technology Associate 98-367: Security Fundamentals Christopher Chapman | Content PM , Microsoft Thomas Willingham | Content Developer, Microsoft

Meet the Presenters Christopher Chapman, MCT Content Project Manager, Microsoft Learning Background IT manager and implementer focused on deploying, maintaining and optimizing networks of all sizes IT Consulting projects include Custom SharePoint for Microsoft IT, Netware/Notes migration to AD/Exchange, Transition to centralized management (250 clients) Instructor and Director of Instruction Multiple Microsoft and other industry certifications (MCP, MCTS, MCSA, MCSE, MCT) Contact christophermva@microsoft.com @ChristopherMSL 1 minute

Meet the Presenters Thomas Willingham Content Developer, Cloud and Enterprise Background Taught the Microsoft MCSE and the Novell CNE certifications, and worked as a network consultant for almost 10 years Courseware Author for MS Learning Content developer for Remote Desktop Virtualization at Microsoft for the last 5 years Contact gotthomas@microsoft.com 1 minute

Course Topics 98-367: Security Fundamentals 01 | Understanding Security Layers 02 | Authentication, Authorization and Accounting 03 | Understanding Security Policies 04 | Understanding Network Security 05 | Protecting Servers and Clients 1 minute

Suggested Prerequisites/Supporting Material Setting Expectations Target Audience IT Help Desk staff interested in moving into Network/Systems Administration Anyone interested in learning more about networking Suggested Prerequisites/Supporting Material 40349A: Windows Operating System Fundamentals: MTA Exam 98-349 40366A: Networking Fundamentals: MTA Exam 98-366 40365A: Windows Server Administration Fundamentals: MTA Exam 98-365 Exam 98-349: Windows Operating System Fundamentals Exam 98-366: Networking Fundamentals Exam 98-365: Windows Server Administration Fundamentals 1 minute

Understanding Security Layers Module 1 Understanding Security Layers Christopher Chapman | Content PM , Microsoft Thomas Willingham | Content Developer, Microsoft

Module Overview Core Security Principles Physical Security

Core Security Principles

Confidentiality, Integrity, Availability (CIA) Confidentiality deals with keeping information, networks, and systems secure from unauthorized access. This can be achieved by using encryption, authentication, and access control. Integrity Integrity is defined as the consistency, accuracy, and validity of data or information. This can be achieve by using hashing. Availability Availability describes a resource being accessible to a user, application, or computer system when required.

Least Privilege, Attack Surface, and Social Engineering User, systems, and applications should have no more privilege than necessary to perform their function or job. Attack Surface Set of methods and avenues an attacker can use to enter a system and potentially cause damage.  Social Engineering Method used to gain access to data, systems, or networks, primarily through misrepresentation. Relies on the trusting nature of the person being attacked.

Risk Management Responses: Avoidance Acceptance Mitigation Transfer

Physical Security

Physical Security First line of defense Achieve by using access control at different layers Defense in Depth approach

Defense in Depth

First line of defense surrounding office Secured by using: External Perimeter First line of defense surrounding office Secured by using: Security cameras Parking lot lights Perimeter fence Gate with guard Gate with access badge reader Guard patrols

Once inside the building Secured by using: Internal Perimeter Once inside the building Secured by using: Locks (on exterior doors, internal doors, office doors, desks, filing cabinets, etc.) Security cameras Badge readers (on doors and elevators) Guard desks and patrols Smoke detectors Turnstiles and mantraps

Specific potion of the building Secured by using: Secure Areas Specific potion of the building Secured by using: Badge readers and Keypads Biometric technologies (e.g., fingerprint scanners, retinal scanners, voice recognition systems, etc.) Security doors X-ray scanners and Metal detectors Cameras Intrusion detection systems (light beam, infrared, microwave, and/or ultrasonic)

Device Security Servers Desktops Mobile Devices Locked in data centers (secure area) Desktops Secured to desks Mobile Devices Docking stations Laptop security cables Laptop safes Theft recovery software Laptop alarms

Additional Resources & Next Steps www.microsoft.com/learning Books Exam 98-367 Security Fundamentals Exam 98-366: MTA Networking Fundamentals Exam Ref 70-410: Installing and Configuring Windows Server 2012 Instructor-Led Courses 40349A: Windows Operating System Fundamentals: MTA Exam 98-349 40366A: Networking Fundamentals: MTA Exam 98-366 40365A: Windows Server Administration Fundamentals: MTA Exam 98-365 20410C: Installing and Configuring Windows Server 2012 Exams & Certifications Exam 98-367: Security Fundamentals Exam 98-349: Windows Operating System Fundamentals Exam 98-366: Networking Fundamentals Exam 98-365: Windows Server Administration Fundamentals Exam 70-410: Installing and Configuring Windows Server 2012