Which of these would be best practices for creating complex passwords? Pick two.
How secure are your passwords? In this video, you’ll learn about password complexity, length, expiration dates, recovery processes, and account lockouts.
Out of the box, your operating system probably isn’t the most secure. In this video, you’ll learn some best practices for security your operating system from the bad guys.
The bad guys don’t need to know your password; they’ll figure it out themselves. In this video, you’ll learn the techniques that the bad guys use to reverse-engineer your password.
How are your users handling the organization’s data? In this video, you’ll learn some techniques for maintaining good data hygiene for your entire user base.
Which of these utilities would be the best choice to force a user password to meet certain complexity requirements?
Which of these Windows utilities would be the best choice for managing password complexity requirements on a stand-alone computer?
An insecure network is an open door to misuse. In this video, you’ll learn ways to help secure your wired and wireless networks.
If you’re looking to keep your workstations secure, then you have to be constantly vigilant. In this video, you’ll learn about best practices dealing with password complexity, user permissions, account availability, and desktop security.
When training your end user community, there are a number of security concerns that must be considered. In this video, you’ll learn which user habits, threat prevention techniques, and business policies should be implemented to keep everyone’s data as safe as possible.