From the course: CompTIA A+ Core 2 (220-1102) Cert Prep
Unlock this course with a free trial
Join today to access over 24,700 courses taught by industry experts.
Security policies
From the course: CompTIA A+ Core 2 (220-1102) Cert Prep
Security policies
- NTFS is fantastic security for your files and folders, but there's a lot of other stuff that happens on your computer where you'd like a little security. For example, what if you want everybody to have passwords that are at least 10 characters long? Or what if you have Bob who's way out in Denver and we don't want him walking up to this machine when he's here in town and logging in, but from Denver, we want him to be able to log in? So, log in remotely versus logging in locally. There's lots of little security stuff that Windows takes care of via what we call our security policies. Now we're going to be setting up policies for just this computer, so we call it a Local Security Policy. So let me show you how this all works. (keyboard keys clicking) So, Local Security Policy is an application that we run. Let me center it 'cause I like it in the center. Now, what you have here is a whole big pile of things you can…
Download courses and learn on the go
Watch courses on your mobile device without an internet connection. Download courses using your iOS or Android LinkedIn Learning app.
Contents
-
-
(Locked)
Understanding partitioning4m 4s
-
(Locked)
MBR partitioning11m 49s
-
(Locked)
GPT partitioning8m 23s
-
(Locked)
Understanding file systems11m 21s
-
(Locked)
Popular file systems6m 24s
-
(Locked)
Formatting in action10m 57s
-
(Locked)
Dynamic disks8m 26s
-
(Locked)
New installation: First drive5m 12s
-
(Locked)
Software RAID in storage spaces9m 27s
-
(Locked)
Encrypting mass storage9m 16s
-
(Locked)
Maintaining storage disks5m 48s
-
(Locked)
-
-
(Locked)
Windows 10 editions and features6m 31s
-
(Locked)
Windows 11 editions and features4m 45s
-
(Locked)
Boot from everything11m 41s
-
(Locked)
Installing and upgrading Windows 105m 36s
-
(Locked)
Post-installation tasks11m 26s
-
(Locked)
Installing and updating Linux3m 24s
-
(Locked)
Upgrading macOS2m 15s
-
(Locked)
-
-
(Locked)
Understanding the CLI10m 50s
-
(Locked)
Navigating the CLI13m 30s
-
(Locked)
Working with folders6m 27s
-
(Locked)
Working with files10m 54s
-
(Locked)
Working with drives12m 52s
-
(Locked)
Super copy commands8m 21s
-
(Locked)
Command-line permissions7m 22s
-
(Locked)
Advanced Windows commands7m 41s
-
(Locked)
Advanced Linux commands11m 2s
-
(Locked)
Introduction to scripting9m 32s
-
(Locked)
Interpreted languages12m 12s
-
(Locked)
Scripting and the terminal9m 19s
-
(Locked)
-
-
(Locked)
Introduction to TCP/IP14m 10s
-
(Locked)
Network IDs and subnet masks4m 34s
-
(Locked)
Special IP addresses9m 14s
-
(Locked)
Network address translation (NAT)7m 11s
-
(Locked)
Dynamic IP addressing9m 39s
-
(Locked)
Working with connections9m 2s
-
(Locked)
Understanding DNS10m 56s
-
(Locked)
Working with DNS7m 3s
-
(Locked)
Windows naming6m 1s
-
(Locked)
Working with workgroups7m 26s
-
(Locked)
Working with active directory13m 38s
-
(Locked)
Windows sharing with macOS and Linux7m 6s
-
(Locked)
The net command4m 15s
-
(Locked)
Routers11m 24s
-
(Locked)
Basic router configuration11m 49s
-
(Locked)
Firewall configuration10m 38s
-
(Locked)
Windows firewall7m 44s
-
(Locked)
Port forwarding7m 12s
-
(Locked)
Advanced router configuration6m 6s
-
(Locked)
Virtual LANs (VLANs)8m 4s
-
(Locked)
-
-
(Locked)
Telnet and SSH6m 47s
-
(Locked)
Remote desktop connections7m 49s
-
(Locked)
The World Wide Web8m 55s
-
(Locked)
File Transfer Protocol (FTP)8m 18s
-
(Locked)
Proxy servers6m 12s
-
(Locked)
Virtual private networks (VPNs)7m 49s
-
(Locked)
Internet of Things (IoT)3m 36s
-
(Locked)
Troubleshooting internet connections: Part 16m 47s
-
(Locked)
Browser security9m 15s
-
(Locked)
-
-
(Locked)
Threats9m 37s
-
(Locked)
Dealing with threats7m 57s
-
(Locked)
Physical security8m 1s
-
(Locked)
Passwords and authentication13m 39s
-
(Locked)
Multifactor authentication (MFA)5m 2s
-
(Locked)
Malware13m 14s
-
(Locked)
Anti-malware11m 19s
-
(Locked)
Social engineering5m 40s
-
(Locked)
Licensing9m 25s
-
(Locked)
Incident response4m 54s
-
(Locked)
Environmental controls5m 36s
-
(Locked)
Malware in action7m 48s
-
(Locked)