Tag: certificate

Data Destruction and Disposal – CompTIA A+ 220-902 – 3.6

Data Destruction and Disposal – CompTIA A+ 220-902 – 3.6

| February 19, 2016 | 0 Comments

You’ve erased the data, but is it really gone? In this video, you’ll learn best practices for physical drive destruction, the use of destruction certificates, some formatting techniques, and how to securely erase individual files.

Continue Reading

Most likely to succeed

Most likely to succeed

| July 9, 2013

In Windows 7, where would you make a change to a user’s certificate information? A) Control Panel / User Accounts B) Administrative Tools / Global Security Policy C) Administrative Tools / Device Manager D) Control Panel / Certificate Manager E) One user had perfect attendance

Continue Reading

Understanding PKI – CompTIA Network+ N10-005: 5.3

Understanding PKI – CompTIA Network+ N10-005: 5.3

| June 28, 2012 | 0 Comments

Setting up a Public Key Infrastructure is a complex process, but it can be a very useful part of an organization’s overall security strategy. In this video, you’ll learn about the importance of certificates and the importance of planning a PKI.

Continue Reading

Microsoft 70-680: 3.5 – Internet Explorer Configuration

Microsoft 70-680: 3.5 – Internet Explorer Configuration

| December 9, 2010 | 0 Comments

Internet Explorer is one of the most popular browsers in the world, and there are a number of management and configuration options available for IE. In this video, you’ll learn about compatibility view, security settings, search providers, add-ons, InPrivate modes, and certificates.

Continue Reading

Microsoft 70-680: 3.3 – Software Restriction Policies

Microsoft 70-680: 3.3 – Software Restriction Policies

| December 9, 2010 | 0 Comments

If you need to manage and control application use on Windows XP, Windows Vista, and Windows 7, then you need software restriction policies. In this video, you’ll learn how to use Group Policies to restrict application use and how to build hash rules, certificate rules, path rules, network zone rules, and default rules.

Continue Reading

X