Security 4CS
Security 4CS
Security 4CS
مركز ميكروسوفت
Security Fundamentals
Session (1)
Lesson 1: Understanding Security Layers
• Introducing Core Security Principles
Understanding Confidentiality
Understanding Integrity
Understanding Availability
Understanding the Principle of Least Privilege
Understanding Separation of Duties
Understanding an Attack Surface
Performing an Attack Surface Analysis
Understanding Social Engineering
Linking Cost with Security
• Understanding Physical Security as the First Line of Defense
Understanding Site Security
Understanding Computer Security
• Performing Threat Modeling
Session (2)
Lesson 2: Understanding Authentication, Authorization,
and Accounting
• Starting Security with Authentication
Authentication Based on What a User Knows
Authentication Based on What a User Owns or Possesses
Authentication Based on a User’s Physical Traits
Introducing RADIUS and TACACS+
Running Programs as an Administrator
• Introducing Directory Services with Active Directory
معهد المستقبل العالي للدراسات التكنولوجية المتخصصة
مركز ميكروسوفت
مركز ميكروسوفت
Session (3)
Lesson 3: Understanding Security Policies
• Using Password Policies to Enhance Security
Using Password Complexity to Make a Stronger Password
Using Account Lockout to Prevent Hacking
Examining Password Length
Using Password History to Enforce Security
Setting Time Between Password Changes
Using Password Group Policies to Enforce Password Security
Configuring and Applying Password Settings Objects
Establishing Password Procedures
Understanding Common Attack Methods
• Protecting Domain User Account Passwords
Session (4)
Lesson 4: Understanding Network Security
• Using Dedicated Firewalls to Protect a Network
Understanding the OSI Model
Types of Hardware Firewalls and Their Characteristics
Understanding When to Use a Hardware Firewall Instead
of a Software Firewall
Understanding Stateful Inspection and Stateless
Inspection
• Using Isolation to Protect the Network
Understanding VLANs
Understanding Routing
Understanding Intrusion Detection Systems (IDS) and
Intrusion Prevention Systems (IPS)
Understanding Honeypots
Understanding DMZ
Understanding NAT
Understanding VPN
Understanding Other VPN Protocols
معهد المستقبل العالي للدراسات التكنولوجية المتخصصة
مركز ميكروسوفت
Session (5)
Lesson 5: Protecting the Server and Client
• Protecting the Client Computer
Protecting Your Computer from Malware
Configuring Windows Updates
Understanding User Account Control (UAC)
Using Windows Firewall
Using Offline Files
Locking Down a Client Computer
• Managing Client Security Using Windows Defender
• Protecting Your Email
Managing Spam
Relaying Email
• Securing Internet Explorer
Understanding Cookies and Privacy Settings
Using Content Zones
Understanding Phishing and Pharming
Understanding Secure Sockets Layer (SSL) and Certificates
معهد المستقبل العالي للدراسات التكنولوجية المتخصصة
مركز ميكروسوفت
Session (6-7)
Exams
معهد المستقبل العالي للدراسات التكنولوجية المتخصصة
مركز ميكروسوفت