Microsoft MTA 98-367 - ITU Online

Microsoft MTA 98-367

Ready to jumpstart your tech career? The Microsoft MTA 98-367 – Security Fundamentals course provides the necessary skills and knowledge for you to ace the Microsoft MTA 98-367 exam. Developed by experts, this training offers a comprehensive overview of essential technology concepts from Microsoft Technology Associate (MTA) certification exams which are set up to verify basic understandings needed when beginning work with Windows technologies.

Included In This Course

Microsoft MTA 98-367
4 Hrs 44 Min
24 On-demand Videos
Closed Captions

Closed Captions

Course Topics
7  Topics
Question & Answers
74 Prep Questions
Certificate of Completion

Certificate of Completion

The “Microsoft MTA 98-367: Security Fundamentals” course offered by ITU Online is designed to provide foundational knowledge in Microsoft security technologies. It covers key concepts necessary for the Microsoft Technology Associate (MTA) certification exams. The course is suitable for individuals starting a career in technology, focusing on Windows Server administration, Windows-based networking, Active Directory, account management, and system recovery tools. Key topics include security layers, operating system security, network security, security software, wireless security, core security principles, cybersecurity, protocol security, and security policy compliance. This course is beneficial even though the associated exam has been retired, offering a solid foundation in security fundamentals. For more detailed information, you can visit their website.

What you will learn

This course includes 5 hours of training and 24 videos. After taking this Microsoft MTA 98-367 course, students will understand the following topics:

  • Understand security layers and operating system security
  • Understand network security and security software
  • Wireless security and core security principles
  • Cyber security
  • Protocol security
  • Security policy compliance

Who Is This Microsoft MTA 98-367 Security Fundamentals Course For?

The “Microsoft MTA 98-367: Security Fundamentals” course is primarily targeted at individuals starting their career in technology. It’s particularly beneficial for those interested in roles involving Windows Server administration and Windows-based networking. The course also suits individuals seeking foundational knowledge in security concepts, network security, and system recovery tools. It’s ideal for those preparing for the Microsoft Technology Associate (MTA) certification, as well as IT professionals who want to enhance their understanding of Microsoft security technologies.

Key Term Knowledge Base: Key Terms Related to Microsoft MTA 98-367 Security Fundamentals

Grasping key terms in Microsoft MTA 98-367 Security Fundamentals is essential for anyone pursuing a career in IT security, particularly in Microsoft environments. Understanding these terms is not only crucial for passing the MTA certification but also for practical, real-world application in securing IT infrastructures. Here’s a list of relevant terms with definitions:

Security LayersDifferent levels at which security can be applied, such as application, data, host, and network.
Operating System SecurityMeasures and controls for protecting the OS from threats and vulnerabilities.
Network SecurityPractices for protecting a network and its data from unauthorized access or attacks.
Security SoftwareSoftware tools designed to protect against and monitor for security threats.
Wireless SecurityProtocols and practices for securing wireless networks.
Active DirectoryA directory service by Microsoft for Windows domain networks, managing users and resources.
Account ManagementThe process of managing user accounts and access rights in an IT environment.
System Recovery ToolsTools and methods used to restore a computer system to a functional state after a failure.
CryptographyThe practice and study of techniques for secure communication in the presence of third parties.
FirewallA network security device that monitors and controls incoming and outgoing network traffic based on predetermined security rules.
Antivirus SoftwareSoftware designed to detect, prevent, and remove malware.
User AuthenticationThe process of verifying the identity of a user before granting access to a system.
AuthorizationThe process of granting or denying specific access rights to a user, program, or process.
AuditAn examination of records or activities to ensure compliance with established controls, policies, and procedures.
CybersecurityThe practice of protecting systems, networks, and programs from digital attacks.
Protocol SecuritySecurity measures applied to communications protocols to protect data transmission.
Security PolicyA set of rules and practices that specify how an organization manages, protects, and distributes sensitive information.
EncryptionThe process of converting information or data into a code to prevent unauthorized access.
VulnerabilityA weakness in a system that can be exploited by a threat to gain unauthorized access.
MalwareMalicious software designed to disrupt, damage, or gain unauthorized access to a computer system.
Social EngineeringThe use of deception to manipulate individuals into divulging confidential or personal information.
Patch ManagementThe process of managing updates for software and systems, particularly security patches.
Intrusion Detection System (IDS)A device or software application that monitors a network for malicious activity or policy violations.
Risk ManagementThe process of identifying, assessing, and controlling threats to an organization’s capital and earnings.
Virtual Private Network (VPN)A service that creates a secure, encrypted connection over a less secure network, such as the internet.
ComplianceAdherence to laws, regulations, guidelines, and specifications relevant to an organization’s business processes.
Data BreachAn incident in which sensitive, protected, or confidential data is accessed or disclosed in an unauthorized fashion.
Two-Factor AuthenticationA security process where two different forms of identification are used to verify a user.
Public Key Infrastructure (PKI)A set of roles, policies, and procedures needed to create, manage, distribute, use, store, and revoke digital certificates and manage public-key encryption.
Security IncidentAn event that may indicate that an organization’s systems or data have been compromised.

These key terms provide a foundational understanding of the concepts and practices in Microsoft MTA 98-367 Security Fundamentals, vital for anyone entering the field of IT security.

Frequently Asked Questions About Microsoft MTA 98-367

What is the Microsoft MTA 98-367 course all about?

This course is all about helping you jumpstart your tech career. It provides the necessary skills and knowledge for you to understand the essential technology concepts from Microsoft Technology Associate (MTA) certification exams. It’s designed for folks looking to get started with Windows technologies.

What’s included in the course?

You’re getting a solid package with this course. It includes 4 training hours, 24 on-demand videos, 7 topics, and 74 prep questions. Plus, you’ll get a Certificate of Completion to show off your new skills.

Is this course for beginners or do I need some experience?

While it does assume some hands-on experience or training, it doesn’t assume on-the-job experience. It’s a great entry point for a future career in tech. If you’ve had some exposure to Windows Server, Windows-based networking, Active Directory, account management, and system recovery tools and concepts, you should be good to go​.

But I heard the exam associated with this course has been retired. Is this course still relevant?

Absolutely! Even though the exam has been retired, this course is a fantastic resource for online training and will still equip you with relevant knowledge and skills for your tech caree.

What will I learn in this course?

You’ll cover some key topics in this course. These include understanding security layers and operating system security, network security and security software, wireless security and core security principles, cybersecurity, protocol security, and security policy compliance. It’s a comprehensive overview that will have you well on your way to understanding and handling security fundamentals.

Is there a certificate at the end of this course?

Yes, there is! You’ll receive a Certificate of Completion once you’ve finished the course. It’s a great way to showcase your achievement and the new skills you’ve acquired​.

Proudly Display
Your Achievement

Upon completion of your training, you’ll receive a personalized certificate of completion to help validate to others your new skills.
Example Certificate

Microsoft 98-367 MTA Security Fundamentals Course Content

Module 1 Understanding Security Layers

  •    Module 1 Notes
  •    1.0 Security Fundamentals Instructor
  •    1.1 Security Fundamentals Intro
  •    1.2 Understanding Security Layers Part1
  •    1.3 Understanding Security Layers Part2

Module 2 Authentication, Authorization, and Accounting

  •    Module 2 Notes
  •    2.0 Authentication, Authorization & Accounting Part1
  •    2.1 Authentication, Authorization & Accounting Part2
  •    2.2 Authentication, Authorization & Accounting Demo

Module 3 Understanding Security Policies

  •    Module 3 Notes
  •    3.0 Understanding Security Policies

Module 4 Understanding Network Security

  •    Module 4 Notes
  •    4.0 Understanding Network Security Part1
  •    4.1 Understanding Network Security Part2

Module 5 Locking Down Server and Client

  •    Module 5 Notes
  •    5.0 Locking Down the Server and Client
  •    5.1 Locking Down the Server and Client Part2

Module 6 Key Takeaways

  •    Key Takeaway Notes
  •    6.0 Key Take Aways Intro
  •    6.1 Understanding Security Layers
  •    6.2 Authentication Authorization and Accounting
  •    6.3 Understanding Security Policies
  •    6.4 Understanding Network Security
  •    6.5 Security Fundamentals Part 2

Module 7 Terms to Know

  •    Terms to Know Notes
  •    7.0 Terms to Know Intro
  •    7.1 Understanding Security Layers Terms
  •    7.2 Authentication Authorization and Accounting Terms
  •    7.3 Understanding Security Policies Terms
  •    7.4 Understanding Network Security Terms
  •    7.5 Locking Down Server and Client Terms
Add a review
Currently, we are not accepting new reviews
Based on 81 reviews
1-5 of 81 reviews
  1. SJ


  2. AA
  3. K
  4. BO
  5. A

    Smooth delivery and easy access to LMS. Good to see that the LMS offers progress tracking. Would be great if badges were offered on completion of courses to share via Credly to future employers.

Microsoft MTA 98-367

Subscribe To All-Access
Lock In $16.99 / Month Forever

Gain access to this training and all our other courses with our cost-effective monthly subscription. No obligations. Cancel anytime.

$49.99 $16.99 Monthly