The user role can be a useful criteria for security management. In this video, you’ll learn the best practices for role-based management and how shared accounts and credentials should be managed.
Managing the applications running on mobile devices requires some additional security planning. In this video, you’ll learn about key management, managing credentials, geo-tagging, and application whitelisting.
The identification and authentication process is a key aspect of network security. In this video, you’ll learn the difference between identification and authentication, the components of your account login, and important best practices for account enrollment.
Access to a Windows 7 computer includes rights, credentials, and authentications. In this video, you’ll learn how to configure Windows 7 rights, manage credentials and certificates, how to elevate user privileges, and using smart cards for multifactor authentication.