Microsoft Security Fundamentals: Security Software

This course is included in our On-demand training solution.


One of the building blocks of successful IT security practices is a fundamental understanding of security software. This course introduces learners to client protection practices, including methods for dealing with malware, antivirus for client protection, and using User Account Control, or UAC. This course also includes fundamental best practices for e-mail protection and server protection, including server hardening. This course is one of a series in the Skillsoft learning path that covers the objectives for the Microsoft Security Fundamentals: MTA 98-367 exam.

Target Audience

Individuals interested in the Microsoft Security Fundamentals: MTA exam (98-367)



Expected Duration

60 min.

Course Objectives

Course Introduction


  • distinguish between types of malware
  • Antivirus for Client Protection

  • identify characteristics of viruses
  • Utilizing User Account Control (UAC)

  • enable and disable UAC
  • Keeping OS and Software Current

  • use Windows Update/Windows Server Update Service
  • Encrypting Offline Files and Folders

  • encrypt offline files and folders
  • Software Restriction Policies

  • recognize benefits of software restriction policies
  • Antispam

  • identify characteristics of spam filtering
  • Spoofing

  • recognize characteristics of spoofing
  • Phishing and Pharming

  • distinguish between phishing and pharming
  • Client versus Server Protection

  • identify the advantages and disadvantages of both client and server protection
  • Sender Policy Framework (SPF) Records

  • describe how SPF records function
  • Pointer (PTR) Records

  • describe how PTR records function
  • Separation of Services

  • identify separation of services best practices
  • Server Hardening

  • recognize importance of hardening the server
  • Keeping Servers Updated

  • recognize the benefits of ensuring that the OS and applications are kept current
  • Securing Dynamic DNS Updates

  • use secure dynamic DNS functionality
  • Disabling Unsecure Authentication Protocols

  • disable unsecure authentication protocols
  • Read-Only Domain Controllers

  • recognize characteristics and benefits of a read-only domain controller
  • VLAN Separate Management

  • describe the concept of separate management of VLAN
  • Microsoft Baseline Security Analyzer (MBSA)

  • use MBSA
  • Exercise: Using Security Software Protection