Securing Mobile Devices – CompTIA A+ 220-902 – 3.5
Your mobile devices include a number of methods to keep your data safe. In this video, you’ll learn about screen locks, locator applications, remote backup, biometric authentication, and much more!
Your mobile devices include a number of methods to keep your data safe. In this video, you’ll learn about screen locks, locator applications, remote backup, biometric authentication, and much more!
How can you make others in your organization aware of the challenges associated with IT security? In this video, you’ll learn about security policy training, network policies, and the principle of least privilege.
Your security policies won’t be very useful if your user community isn’t trained. In this video, you’ll learn some techniques for training your users on your organization’s security policies.
Security policies are standard requirements for most organizations. In this video, you’ll learn about the best practices for security policies and ways to keep your user community updated with the latest information about security policies and procedures.
How knowledgeable are your users? In this video, you’ll learn how to set up training sessions for your user community.
You’ve spent hours documenting your network, but will all that work really be worth the effort? In this module, you’ll learn how your network documentation can be used to determine points of failure, evaluate network baselines, and help manage crisis situations.
Building a network is a technological challenge, but the network isn’t truly finished until the documentation is complete. In this module, you’ll learn about the importance of documentation and how your network could benefit from schematics, baselines, procedures, and much more.