Unless you’re a system administrator, there are a number of Windows tools that you’ll never have a chance to use. In this video, you’ll learn about some of the important administrative tools.
Your security policies and your network policies should be closely related. In this video, you’ll learn about the important of security policies and network policies, the use of an acceptable use policy, and common agreements with third-parties.
Companies rely on security policies for their WAN to manage and secure traffic flows. In this video, you’ll learn about traffic blocking policies and traffic throttling technologies.
A firewall is a complex device that can be easily misconfigured. In this video, you’ll learn about connectivity misconfigurations, security policy problems, and misconfigured ACLs or applications.
There are many risks associated with keeping a business running. In this video, you’ll learn about business risk and some of the continuity plans that should be included in a comprehensive business risk analysis.
The process of planning and implementing security policies can provide some significant security advantages in the future. In this video, you’ll learn about third-party security policies and what can happen when third-party security policies are not properly followed.
The backbone of any security strategy is the creation and management of security policies. In this video, you’ll learn why policies are important and which parts of the organization will be involved in the creation of security policies.
What type of business policy would provide you with only the rights necessary to perform your job?
If your computer isn’t part of a Windows Domain, then you’ll manage your security policies on the local computers. In this video, you’ll learn how to start and use the Windows Local Security Policy manager.