98-367: Security Fundamentals

Get ready for your exam by enrolling in our comprehensive training course. This course includes a full set of instructional videos designed to equip you with in-depth knowledge essential for passing the certification exam with flying colors.

What’s included

  • 66 : Lectures
  • 5h 54m : Duration
video-file-formats

$14.99/24.99


Lectures
1. Welcome!- 1m 22s
2. Why MTA Security Fundamentals?- 6m 19s
3. Challenge: Hackers- 1m 23s
4. Challenge Walkthrough: Hackers- 3m 45s

Lectures
1. What To Expect In This Section?- 40s
2. Core Security Principles - Part 1- 8m 56s
3. Core Security Principles - Part 2- 4m 59s
4. The Principle of Least Privilege- 10m 23s
5. Social Engineering- 5m
6. Man-In-The-Middle Attacks - introduction part 1- 7m 13s
7. Man-In-The-Middle Attacks - introduction part 2- 7m 35s
8. A Man-In-The-Middle Attack In Action With Cain&Able- 5m 42s
9. Microsoft Baseline Security Analyzer- 10m 36s
10. Physical Security- 7m 19s
11. Mobile Devices Security- 4m 57s
12. Overview of Internet Security- 6m 35s
13. Internet Explorer Security Zones- 7m 32s
14. Tips That Can Help You Protect Your Privacy- 5m 50s
15. Overview of Wireless Security- 6m 24s
16. Let's configure a real router and access point- 10m 1s
17. Wireless Too Slow?- 5m 5s
18. Let's Summarize This Section- 18s

Lectures
1. What To Expect In This Section?- 41s
2. User Authentication- 9m 21s
3. Let's Check A Real Radius Server- 6m 55s
4. Public Key Infrastucture (PKI) And Certificates- 5m 51s
5. Certificates and how to use them- 6m 48s
6. How To Manage Users And Passwords In Windows Server- 2m 49s
7. NTFS Permissions- 5m 26s
8. Shares And Permissions In Action- 10m 40s
9. Run-as explained- 2m 46s
10. Password Policies- 3m 16s
11. Audit Policies- 5m 34s
12. Bitlocker explained- 6m 36s
13. Malware And What You Can Do About It- 4m 44s
14. Installing and tweaking an antivirus application - a lab- 8m 46s
15. Let's Summarize This Section- 18s

Lectures
1. What To Expect In This Section?- 37s
2. Why Do We Need A Firewall?- 10m 43s
3. Let's Check Out A Real Firewall And UTM- 8m 8s
4. Oh no..- 6m 11s
5. How a firewall can stop a virus- 4m 48s
6. Network Access Protection- 4m 15s
7. What is a VLAN?- 6m 17s
8. What is a DMZ?- 7m 4s
9. A real world example of VLANs and DMZ- 5m 53s
10. Introduction to IPSec- 7m 18s
11. IPSec in action- 7m 20s
12. Names Resolution- 4m 33s
13. How to use Wireshark to caputer network traffic- 4m 33s
14. Let's Summarize This Section- 23s

Lectures
1. What To Expect In This Section?- 17s
2. Client Protection- 5m 1s
3. User Access Control- 2m 52s
4. Email Protection- 4m 31s
5. Phishing - examples- 4m 30s
6. Server protection- 2m 37s

Lectures
1. More About IPsec- 8m 26s
2. Bonus video - encryption- 4m 11s
3. Let's Summarize Our Training- 51s
4. How to use GPOs to make your server more secure- 5m 29s
5. Bonus video - a S2S VPN on a Cisco router- 7m 37s
6. Bonus video - remote support tools- 3m 56s
7. Remote VPN Access- 8m 43s
8. The SHA1 Function is now Dead- 2m 56s
9. More About Wireless Security- 5m 35s

PassQueen does not provide real Microsoft exam questions. Similarly, PassQueen does not supply real Amazon exam questions. The materials offered by PassQueen lack real questions and answers of certification exams. The CFA Institute neither endorses nor assures the accuracy or quality of PassQueen content. CFA® and Chartered Financial Analyst® are registered trademarks held by the CFA Institute.

Helpful Pages

© 2025 All Rights Reserved passqueen.com.