Microsoft Security Fundamentals: Operating System Security

This course is included in our On-demand training solution.


One of the building blocks of successful IT security practices is a fundamental understanding of operating system security. This course provides an introduction to the concept of user authentication, including multifactor and Remote Authentication Dial-In User Service (RADIUS) authentication. This course also covers key concepts of permissions, such as file, Active Directory, share, and group permissions. Finally, this course covers fundamental security policies including password and audit policies, as well as encryption and malware best practices. This course is one of a series in the Skillsoft learning path that covers the objectives for the Microsoft Security Fundamentals: MTA 98-367 exam.

Target Audience

Individuals interested in the Microsoft Security Fundamentals: MTA exam (98-367)



Expected Duration

90 min.

Course Objectives

Course Introduction

Multifactor Authentication

  • recognize characteristics of authentication
  • Authentication Methods

  • distinguish between different authentication methods
  • RADIUS Authentication

  • recognize characteristics of RADIUS authentication
  • Public Key Infrastructure (PKI)

  • identify characteristics of PKI
  • Using Run As

  • use Run As to perform administrative tasks
  • Password Reset Procedures

  • identify best practices when establishing password reset procedures
  • File and Registry Permissions

  • distinguish between the types of permissions that can be applied
  • Active Directory Permissions

  • identify characteristics of Active Directory permissions
  • Copying and Moving Files

  • distinguish NTFS permission behaviors when copying and moving files
  • Share Permissions

  • distinguish and apply share permissions
  • NTFS v. FAT

  • distinguish between NT file system, or NTFS, and file allocation table, or FAT, file systems permissions characteristics
  • Inheritance

  • enable and disable inheritance
  • Group Permissions

  • set multiple groups with different permissions
  • Ownership and Delegation

  • set ownership and delegation permission settings
  • Password Complexity, Length, Change Cycle, and History

  • recognize password policy best practices
  • Lockout and Group Policies

  • implement password policy settings
  • Common Attack Methods

  • recognize common password attack methods
  • Types of Auditing

  • distinguish between the different auditing types
  • Auditing Best Practices

  • recognize auditing best practices
  • Enabling and Securing Audit Information

  • enable and secure audits and audit information
  • EFS

  • identify the characteristics of EFS
  • Encryption Methods

  • distinguish between different encryption methods
  • VPN and Encryption Algorithms

  • identify characteristics and uses of VPN and encryption algorithms
  • Certificate Properties, Services, and Infrastructure

  • recognize certificate properties and services policy best practices
  • Token Devices

  • recognize characteristics of token devices
  • Buffer Overflow

  • recognize characteristics of buffer overflow
  • Worms, Trojans, and Spyware

  • distinguish between characteristics of worms, trojans, and spyware
  • Exercise: Using Operating System Security Methods