You are on page 1of 6

‫معهد المستقبل العالي للدراسات التكنولوجية المتخصصة‬

‫مركز ميكروسوفت‬

Computer Science 4th Year

Security Fundamentals
Session (1)
Lesson 1: Understanding Security Layers
• Introducing Core Security Principles
Understanding Confidentiality
Understanding Integrity
Understanding Availability
Understanding the Principle of Least Privilege
Understanding Separation of Duties
Understanding an Attack Surface
Performing an Attack Surface Analysis
Understanding Social Engineering
Linking Cost with Security
• Understanding Physical Security as the First Line of Defense
Understanding Site Security
Understanding Computer Security
• Performing Threat Modeling

Session (2)
Lesson 2: Understanding Authentication, Authorization,
and Accounting
• Starting Security with Authentication
Authentication Based on What a User Knows
Authentication Based on What a User Owns or Possesses
Authentication Based on a User’s Physical Traits
Introducing RADIUS and TACACS+
Running Programs as an Administrator
• Introducing Directory Services with Active Directory
‫معهد المستقبل العالي للدراسات التكنولوجية المتخصصة‬

‫مركز ميكروسوفت‬

Understanding Domain Controllers


Understanding NTLM
Understanding Kerberos
Using Organizational Units
Understanding Objects
Using Groups
Understanding Web Server Authentication
• Comparing Rights and Permissions
• Understanding NTFS
Using NTFS Permissions
Understanding Effective NTFS Permissions
Copying and Moving Files
Using Folder and File Owners
• Sharing Drives and Folders
Understanding Special Shares and Administrative Shares
• Introducing the Registry
• Using Encryption to Protect Data
Types of Encryption
Introducing Public Key Infrastructure (PKI)
Encrypting Email
Encrypting Files with EFS
Encrypting Disks in Windows
• Understanding IPsec
Encrypting with VPN Technology
• Introducing Smart Cards
• Configuring Biometrics, Windows Hello, and Microsoft Passport
• Using Auditing to Complete the Security Picture
‫معهد المستقبل العالي للدراسات التكنولوجية المتخصصة‬

‫مركز ميكروسوفت‬

Session (3)
Lesson 3: Understanding Security Policies
• Using Password Policies to Enhance Security
Using Password Complexity to Make a Stronger Password
Using Account Lockout to Prevent Hacking
Examining Password Length
Using Password History to Enforce Security
Setting Time Between Password Changes
Using Password Group Policies to Enforce Password Security
Configuring and Applying Password Settings Objects
Establishing Password Procedures
Understanding Common Attack Methods
• Protecting Domain User Account Passwords

Session (4)
Lesson 4: Understanding Network Security
• Using Dedicated Firewalls to Protect a Network
Understanding the OSI Model
Types of Hardware Firewalls and Their Characteristics
Understanding When to Use a Hardware Firewall Instead
of a Software Firewall
Understanding Stateful Inspection and Stateless
Inspection
• Using Isolation to Protect the Network
Understanding VLANs
Understanding Routing
Understanding Intrusion Detection Systems (IDS) and
Intrusion Prevention Systems (IPS)
Understanding Honeypots
Understanding DMZ
Understanding NAT
Understanding VPN
Understanding Other VPN Protocols
‫معهد المستقبل العالي للدراسات التكنولوجية المتخصصة‬

‫مركز ميكروسوفت‬

Understanding Server and Domain Isolation


• Protecting Data with Protocol Security
Understanding Tunneling
Understanding DNS Security Extensions (DNSSEC)
Understanding Protocol Spoofing
Understanding Network Sniffing
Understanding Common Attack Methods
• Understanding Denial-of-Service (DoS) Attacks
• Securing the Wireless Network
Understanding Service Set IDentifier (SSID)
Understanding Keys
Understanding MAC Filters
Understanding the Advantages and Disadvantages of Specific
Security Types

Session (5)
Lesson 5: Protecting the Server and Client
• Protecting the Client Computer
Protecting Your Computer from Malware
Configuring Windows Updates
Understanding User Account Control (UAC)
Using Windows Firewall
Using Offline Files
Locking Down a Client Computer
• Managing Client Security Using Windows Defender
• Protecting Your Email
Managing Spam
Relaying Email
• Securing Internet Explorer
Understanding Cookies and Privacy Settings
Using Content Zones
Understanding Phishing and Pharming
Understanding Secure Sockets Layer (SSL) and Certificates
‫معهد المستقبل العالي للدراسات التكنولوجية المتخصصة‬

‫مركز ميكروسوفت‬

• Configuring Microsoft Edge


• Protecting Your Server
Separating Services
Using a Read-Only Domain Controller (RODC)
Hardening Servers
Understanding Secure Dynamic DNS
• Using Security Baselines
Using Security Templates
Using Security Compliance Manager
• Locking Down Devices to Run Only Trusted Applications
• Managing Windows Store Apps
Configuring the Windows Store
Implementing Windows Store Apps
Implementing Windows Store for Business

Session (6-7)
Exams
‫معهد المستقبل العالي للدراسات التكنولوجية المتخصصة‬

‫مركز ميكروسوفت‬

You might also like