
- English
- ePUB (mobile friendly)
- Available on iOS & Android
Microsoft Windows Security Essentials
About this book
Windows security concepts and technologies for IT beginners
IT security can be a complex topic, especially for those new to the field of IT. This full-color book, with a focus on the Microsoft Technology Associate (MTA) program, offers a clear and easy-to-understand approach to Windows security risks and attacks for newcomers to the world of IT. By paring down to just the essentials, beginners gain a solid foundation of security concepts upon which more advanced topics and technologies can be built.
This straightforward guide begins each chapter by laying out a list of topics to be discussed, followed by a concise discussion of the core networking skills you need to have to gain a strong handle on the subject matter. Chapters conclude with review questions and suggested labs so you can measure your level of understanding of the chapter's content.
- Serves as an ideal resource for gaining a solid understanding of fundamental security concepts and skills
- Offers a straightforward and direct approach to security basics and covers anti-malware software products, firewalls, network topologies and devices, network ports, and more
- Reviews all the topics you need to know for taking the MTA 98-367 exam
- Provides an overview of security components, looks at securing access with permissions, addresses audit policies and network auditing, and examines protecting clients and servers
If you're new to IT and interested in entering the IT workforce, then Microsoft Windows Security Essentials is essential reading.
Tools to learn more effectively

Saving Books

Keyword Search

Annotating Text

Listen to it instead
Information
Chapter 1
Understanding Core Security Principles
- Understanding risk
- Exploring the security triad
- Implementing a defense-in-depth security strategy
- Enforcing the principle of least privilege
- Hardening a server
Understanding Risk

NISTâs Definition of Risk
Table of contents
- Cover
- Table of Contents
- Title
- Credits
- Copyright
- Publisher's Note
- Dedication
- Acknowledgments
- About the Author
- Introduction
- Chapter 1: Understanding Core Security Principles
- Chapter 2: Understanding Malware and Social Engineering
- Chapter 3: Understanding User Authentication
- Chapter 4: Securing Access with Permissions
- Chapter 5: Using Audit Policies and Network Auditing
- Chapter 6: Protecting Clients and Servers
- Chapter 7: Protecting a Network
- Chapter 8: Understanding Wireless Security
- Chapter 9: Understanding Physical Security
- Chapter 10: Enforcing Confidentiality with Encryption
- Chapter 11: Understanding Certificates and a PKI
- Chapter 12: Understanding Internet Explorer Security
- Appendix A: Answers to Review Questions
- Appendix B: Microsoftâs Certification Program
- Index
- Appendix C: Answers to Additional Exercises
- Appendix D: Optional Lab to Create a Virtual Environment
- Glossary
- End User License Agreement
Frequently asked questions
- Essential is ideal for learners and professionals who enjoy exploring a wide range of subjects. Access the Essential Library with 800,000+ trusted titles and best-sellers across business, personal growth, and the humanities. Includes unlimited reading time and Standard Read Aloud voice.
- Complete: Perfect for advanced learners and researchers needing full, unrestricted access. Unlock 1.4M+ books across hundreds of subjects, including academic and specialized titles. The Complete Plan also includes advanced features like Premium Read Aloud and Research Assistant.
Please note we cannot support devices running on iOS 13 and Android 7 or earlier. Learn more about using the app