Unit XIV
14.1.1 Securing Workstations
Learn the best practices when securing workstations and keeping stored data private and secure. S...
14.1.2 Account Management
Learn the best practices for managing user accounts in an enterprise setting. Principle-of-Least-...
14.10.1 Browsers
Learn how to setup browsers for maximum security. The most common browsers are: Google Chrome Ap...
14.2.1 Incident Responses
Learn how to properly respond to security or privacy incidents in enterprise settings. Data theft...
14.2.3 Data Regulation
Learn how to properly handle sensitive user data according to the law. Mishandling sensitive user...
14.4.1 Logical Security Measures
Learn about different reasonable, logical security measures organizations employ to protect their...
14.4.5 Linux User Elevation
Learn how to perform operations with elevated privileges on Linux systems. On Linux, there are tw...
14.4.6 Windows Password Policies
Learn to configure the password policy on Microsoft-Windows systems. Policy list: Minimum Passwo...
14.5.1 Social Engineering
Learn about the different social engineering attacks. Social engineering is the practice of manip...
14.5.2 Threats
Learn about the different type of threats to data and computer networks. There are three main typ...
14.6.1 Data Destruction
Learn about the ways to properly destroy data stored on storage drives. There are two ways to des...
14.6.2 Disk Wiping Methods
Learn about the different tools one can use to wipe a disk. Basically, you overwrite the data wit...
14.7.1 Malware
Learn about the different types of malicious software and the danger they pose to computer networ...
14.8.1 Firewalls
Learn the basics behind firewalls. There are two types of firewalls: hardware and software. There...
14.9.1 Proxy Server Basics
Learn the basics behind proxy servers. Proxy servers are devices or software programs that allow ...