Your mobile devices include a number of methods to keep your data safe. In this video, you’ll learn about screen locks, locator applications, remote backup, biometric authentication, and much more!
Organizations use a formal set of policies to help guide their security requirements. In this video, you’ll learn about security policies and how they are used to develop a formal security posture. << Previous: Switch Port SecurityNext: Disabling Unneeded Services >> One way to maintain a good security posture is to have everyone understanding exactly …
Security policies are standard requirements for most organizations. In this video, you’ll learn about the best practices for security policies and ways to keep your user community updated with the latest information about security policies and procedures.
If you need to manage and control application use on Windows XP, Windows Vista, and Windows 7, then you need software restriction policies. In this video, you’ll learn how to use Group Policies to restrict application use and how to build hash rules, certificate rules, path rules, network zone rules, and default rules.
You’ve spent hours documenting your network, but will all that work really be worth the effort? In this module, you’ll learn how your network documentation can be used to determine points of failure, evaluate network baselines, and help manage crisis situations.
Building a network is a technological challenge, but the network isn’t truly finished until the documentation is complete. In this module, you’ll learn about the importance of documentation and how your network could benefit from schematics, baselines, procedures, and much more.