There are many security threats constantly attacking our computers and our data. In this video, you’ll learn about social engineering, shoulder surfing, malware, rootkits, and much more.
When training your end user community, there are a number of security concerns that must be considered. In this video, you’ll learn which user habits, threat prevention techniques, and business policies should be implemented to keep everyone’s data as safe as possible.
There are a number of digital security techniques that can help protect your system from the bad guys. In this video, you’ll learn about anti-virus/anti-spyware software, firewalls, account protection, and user rights and permissions
We often think of network security as bits and bytes, but a large part of technology security exists in the physical world. In this video, you’ll learn about hardware locks, tailgating, shoulder surfing, shredding, and more.
The virtualization of operating systems is relatively common these days, and in this video you’ll learn about some of the requirements and techniques for running virtual operating systems on your desktop.
Data security is one of the most important considerations for a system administrator. In this video, you’ll learn about users and groups, shared files and folders, NTFS vs. share permissions, and user authentication.
If you want to maintain the uptime of your systems, you’ll want to use the best preventive maintenance tools. In this video, you’ll learn of built-in maintenance tools that you can use to keep your computer running.