You’ve erased the data, but is it really gone? In this video, you’ll learn best practices for physical drive destruction, the use of destruction certificates, some formatting techniques, and how to securely erase individual files.
In Windows 7, where would you make a change to a user’s certificate information? A) Control Panel / User Accounts B) Administrative Tools / Global Security Policy C) Administrative Tools / Device Manager D) Control Panel / Certificate Manager E) One user had perfect attendance
Setting up a Public Key Infrastructure is a complex process, but it can be a very useful part of an organization’s overall security strategy. In this video, you’ll learn about the importance of certificates and the importance of planning a PKI.
Internet Explorer is one of the most popular browsers in the world, and there are a number of management and configuration options available for IE. In this video, you’ll learn about compatibility view, security settings, search providers, add-ons, InPrivate modes, and certificates.
If you need to manage and control application use on Windows XP, Windows Vista, and Windows 7, then you need software restriction policies. In this video, you’ll learn how to use Group Policies to restrict application use and how to build hash rules, certificate rules, path rules, network zone rules, and default rules.