Tag: certificate

Data Destruction and Disposal – CompTIA A+ 220-902 – 3.6

Data Destruction and Disposal – CompTIA A+ 220-902 – 3.6

Published on February 19th, 2016 at 10:43 am

Last modified on July 5th, 2018 at 4:15 pm

You’ve erased the data, but is it really gone? In this video, you’ll learn best practices for physical drive destruction, the use of destruction certificates, some formatting techniques, and how to securely erase individual files.

Continue Reading

Most likely to succeed

Most likely to succeed

Published on July 9th, 2013 at 8:00 am

In Windows 7, where would you make a change to a user’s certificate information? A) Control Panel / User Accounts B) Administrative Tools / Global Security Policy C) Administrative Tools / Device Manager D) Control Panel / Certificate Manager E) One user had perfect attendance

Continue Reading

Understanding PKI – CompTIA Network+ N10-005: 5.3

Understanding PKI – CompTIA Network+ N10-005: 5.3

Published on June 28th, 2012 at 9:42 am

Setting up a Public Key Infrastructure is a complex process, but it can be a very useful part of an organization’s overall security strategy. In this video, you’ll learn about the importance of certificates and the importance of planning a PKI.

Continue Reading

Microsoft 70-680: 3.5 – Internet Explorer Configuration

Microsoft 70-680: 3.5 – Internet Explorer Configuration

Published on December 9th, 2010 at 11:39 pm

Last modified on March 10th, 2018 at 10:50 am

Internet Explorer is one of the most popular browsers in the world, and there are a number of management and configuration options available for IE. In this video, you’ll learn about compatibility view, security settings, search providers, add-ons, InPrivate modes, and certificates.

Continue Reading

Microsoft 70-680: 3.3 – Software Restriction Policies

Microsoft 70-680: 3.3 – Software Restriction Policies

Published on December 9th, 2010 at 11:35 pm

Last modified on March 10th, 2018 at 10:50 am

If you need to manage and control application use on Windows XP, Windows Vista, and Windows 7, then you need software restriction policies. In this video, you’ll learn how to use Group Policies to restrict application use and how to build hash rules, certificate rules, path rules, network zone rules, and default rules.

Continue Reading

X