Course 5383: Fundamentals of Windows Vista Security Attacks

Product type

Course 5383: Fundamentals of Windows Vista Security Attacks

Microsoft Learning
Logo Microsoft Learning

Need more information? Get more details on the site of the provider.

Description

Introduction In this online course, you learn, in depth, the fundamentals of security attacks in relation to Windows Vista. This includes attacks from viruses, worms, trojans, root kits, spyware, and phishing. This also helps prepare you for certification exam 70-623. This online course is composed of a rich multimedia experience coupled with comprehensive technical labs. It is intended for IT Professionals who support Windows Vista in a home environment.

To get the most out of this course it is recommended that you have strong Windows Vista technical skills. This course also helps you prepare to become a Microsoft IT Professional (MCITP). Objectives At the end of the course, students will …

Read the complete description

Frequently asked questions

There are no frequently asked questions yet. If you have any more questions or need help, contact our customer service.

Introduction In this online course, you learn, in depth, the fundamentals of security attacks in relation to Windows Vista. This includes attacks from viruses, worms, trojans, root kits, spyware, and phishing. This also helps prepare you for certification exam 70-623. This online course is composed of a rich multimedia experience coupled with comprehensive technical labs. It is intended for IT Professionals who support Windows Vista in a home environment.

To get the most out of this course it is recommended that you have strong Windows Vista technical skills. This course also helps you prepare to become a Microsoft IT Professional (MCITP). Objectives At the end of the course, students will be able to:
  • Describe the key characteristics of Computer Viruses.
  • Describe the key characteristics of Spyware and Phishing Attacks.
  • Describe how to reduce the risk of a computer attack.
  • Describe the symptoms of a computer virus.
  • Describe the symptoms of a Root Kit.
  • Describe how to reduce the computer attack surface.
Modules & Lessons Course Overview Module Introduction Navigation Overview Lab Information Course Information Fundamentals of Windows Security Attacks Module Introduction Computer Viruses Lesson Introduction What Are Computer Viruses? What Are the Symptoms of a Computer Virus? What Are the Indicators of a Computer Virus? The Life Cycle of a Computer Virus How Computer Worms Work Characteristics of a Trojan Horse Self Test Spyware and Phishing Attacks Lesson Introduction The Consequences of Spyware and Phishing Attacks What is Spyware? What is Phishing? Self Test Reducing the Risk of a Computer Attack Lesson Introduction What is a Computer's Attack Surface? Guidelines for Reducing a Computer's Attack Surface Methods of Virus Detection How to Configure Internet Explorer 7 and Client E-Mail Application Security Settings Guidelines for Safe Internet and E-Mail Usage Self Test Lab: Fundamentals of Windows Security Attacks Lesson Introduction Scenario Exercise Information Launch the Lab Lab Review Tech Tips Lesson Introduction Why Trojan Horse? Advanced Malware Cleaning Unexpected Spyware Module Summary System Requirements To view this course, you need:
  • A Pentium II, 256 MB RAM with a processor speed greater than or equal to 400 MHZ
  • Microsoft® Windows® 2000 or higher
  • Microsoft Internet Explorer 6.0 or higher
  • Adobe Flash 7.0 or higher (1MB disk space needed to install)
  • Microsoft Silverlight 4.0 or higher
  • Microsoft Windows Media Player 7.0 or higher
  • Microsoft XML Core Services 3.0 or higher
  • A Super VGA monitor with minimum screen resolution 1024x768, with 16-bit color.
  • A sound card, and either speakers or headphones (for multi-media audio).
  • Internet bandwidth of 56K or faster. Broadband internet access is recommended.
For courses containing Virtual Server-based labs (courses in the IT Professional and Developer Catalog), you will need:
  • Microsoft Virtual Server ActiveX control (1MB disk space needed to install)
Test your computer's capabilities to see if it supports this course. Accessibility Requirements The following software must be running on your computer in order to access this course with Screen Reader Software:
  • Microsoft Internet Explorer 6.0 or higher
  • Window-Eyes from GW Micro
  • JAWS from Freedom Scientific
  • MSAA enabled
There are no reviews yet.

Share your review

Do you have experience with this course? Submit your review and help other people make the right choice. As a thank you for your effort we will donate $1.- to Stichting Edukans.

There are no frequently asked questions yet. If you have any more questions or need help, contact our customer service.