Skip to main content

Unit XIV

14.1.1 Securing Workstations

Learn the best practices when securing workstations and keeping stored data private and secure. S...

14.1.2 Account Management

Learn the best practices for managing user accounts in an enterprise setting. Principle-of-Least-...

14.10.1 Browsers

Learn how to setup browsers for maximum security. The most common browsers are: Google Chrome Ap...

14.2.1 Incident Responses

Learn how to properly respond to security or privacy incidents in enterprise settings. Data theft...

14.2.3 Data Regulation

Learn how to properly handle sensitive user data according to the law. Mishandling sensitive user...

14.4.1 Logical Security Measures

Learn about different reasonable, logical security measures organizations employ to protect their...

14.4.5 Linux User Elevation

Learn how to perform operations with elevated privileges on Linux systems. On Linux, there are tw...

14.4.6 Windows Password Policies

Learn to configure the password policy on Microsoft-Windows systems. Policy list: Minimum Passwo...

14.5.1 Social Engineering

Learn about the different social engineering attacks. Social engineering is the practice of manip...

14.5.2 Threats

Learn about the different type of threats to data and computer networks. There are three main typ...

14.6.1 Data Destruction

Learn about the ways to properly destroy data stored on storage drives. There are two ways to des...

14.6.2 Disk Wiping Methods

Learn about the different tools one can use to wipe a disk. Basically, you overwrite the data wit...

14.7.1 Malware

Learn about the different types of malicious software and the danger they pose to computer networ...

14.8.1 Firewalls

Learn the basics behind firewalls. There are two types of firewalls: hardware and software. There...

14.9.1 Proxy Server Basics

Learn the basics behind proxy servers. Proxy servers are devices or software programs that allow ...