Workstation Security Best Practices – CompTIA A+ 220-902 – 3.4
Are your workstations secure? In this video, you’ll learn about password guidelines, desktop security, user permissions, account lockouts, data encryption, and more.
Are your workstations secure? In this video, you’ll learn about password guidelines, desktop security, user permissions, account lockouts, data encryption, and more.
There are many techniques in Windows that can be used to secure the operating system. In this video, you’ll learn about file permissions, user authentication, full-disk encryption, and more.
How can you make others in your organization aware of the challenges associated with IT security? In this video, you’ll learn about security policy training, network policies, and the principle of least privilege.
Digital security can be more important than physical security, especially if your systems access resources across the Internet. In this video, you’ll learn about some of the most important considerations for digital security.
Some of the most important security prevention methods are those used in the physical world. In this video, you’ll learn about some of the most commonly used physical security prevention methods.
There are a number of different methods that the bad guys can use to attack your systems. In this video, you’ll learn how to recognize and protect yourself from the most well-known security threats.
It’s very common to use multiple mobile devices and computers, so it’s important that all of our data is synchronized between all of these devices. In this video, you’ll learn about mobile device synchronization options.
We rely on our mobile devices to provide access to our email inbox. In this video, you’ll learn how to configure your mobile device to connect to any of the popular mail providers.
Our mobile devices can communicate using many different network technologies. In this video, you’ll you’ll learn how your phone’s broadband radio, 802.11 wireless, and Bluetooth networks work together to connect your devices to yourself and each other.
Our mobile operating systems and hardware incorporate a number of modern conveniences. In this video, you’ll learn how Apple iOS, Google Android, and Windows Mobile takes advantage of different display technologies, location services, calling features, and much more.