CompTIA A+ Core 2: Operating System Security Best Practices

CompTIA    |    Beginner
  • 16 videos | 1h 34m 54s
  • Includes Assessment
  • Earns a Badge
Rating 4.6 of 80 users Rating 4.6 of 80 users (80)
There are many things to consider when managing and configuring basic security settings in the Microsoft Windows OS. Therefore, technicians must become well versed in configuring and enforcing workstations to meet best practices for security. In this course, you will begin by learning how to configure basic security settings including firewalls, Defender anti-virus, users and groups, and operating system login options. Explore the difference between NTFS and share permissions and discuss file and folder attributes and inheritance. Next, discover features of the administrator and standard user accounts and learn the fundamentals of user account control (UAC). Lastly, explore how to configure workstation security using features such as encryption, complex passwords, and account management and how to disable the AutoRun and AutoPlay features. Upon completion, you'll know how to configure basic security setting in the Windows OS. This course is part of a series used to prepare for the CompTIA A+ Core 2 (220-1102) certification exam.

WHAT YOU WILL LEARN

  • Discover the key concepts covered in this course
    Provide an overview of the defender anti-virus including how to activate it and update definitions
    Demonstrate how to implement firewalls and describe how they offer port and application security
    Differentiate between local and microsoft accounts, as well as standard, administrator, guest, and power user accounts
    List security login options such as usernames and passwords, personal identification number (pin), fingerprint, facial recognition and single sign-on (sso)
    Differentiate between new technology file system (ntfs) and share permissions and recognize file and folder attributes and inheritance
    Discuss features of the administrator and standard user accounts and provide an overview of user account control (uac)
    Provide an overview of bitlocker and bitlocker to go
  • Recognize how to use encrypted file systems (efs) to secure data on an operating system
    Provide an overview of encryption options for data-at-rest
    List common password best practices such as using complex password, enabling expiration requirements, and basic input/output system (bios)/unified extensible firmware interface (uefi) passwords
    List best practices end users can follow to ensure a safe computing environment
    Recognize account management fundamentals including restricting login times, disabling user accounts, enabling failed attempts lockout, and using screen locks
    Demonstrate how to handle the administrator account including renaming the account and changing the default password
    Differentiate between autorun and autoplay and recognize when to disable these features
    Summarize the key concepts covered in this course

IN THIS COURSE

  • 1m 52s
  • 4m 30s
    After completing this video, you will be able to provide an overview of the Defender anti-virus including how to activate it and update definitions. FREE ACCESS
  • Locked
    3.  Firewall Security Practices
    6m 54s
    In this video, you will learn how to implement firewalls and describe how they offer port and application security. FREE ACCESS
  • Locked
    4.  Users and Groups
    6m 14s
    In this video, learn how to differentiate between local and Microsoft accounts, as well as standard, administrator, guest, and power user accounts. FREE ACCESS
  • Locked
    5.  Login Operating System Options
    5m 43s
    Upon completion of this video, you will be able to list security login options such as usernames and passwords, personal identification number (PIN), fingerprint, facial recognition, and single sign-on (SSO). FREE ACCESS
  • Locked
    6.  NTFS vs. Share Permissions
    7m 15s
    Learn how to differentiate between NTFS and share permissions, and recognize file and folder attributes and inheritance. FREE ACCESS
  • Locked
    7.  Administrator vs. Standard Users
    6m 24s
    During this video, you will learn how to discuss features of the administrator and standard user accounts, and provide an overview of user account control (UAC). FREE ACCESS
  • Locked
    8.  BitLocker and BitLocker To Go
    6m 26s
    After completing this video, you will be able to provide an overview of BitLocker and BitLocker To Go. FREE ACCESS
  • Locked
    9.  Encrypting File System
    8m 26s
    After completing this video, you will be able to recognize how to use encrypted file systems (EFS) to secure data on an operating system. FREE ACCESS
  • Locked
    10.  Data-at-rest Encryption
    8m 1s
    After completing this video, you will be able to provide an overview of encryption options for data-at-rest. FREE ACCESS
  • Locked
    11.  Password Best Practices
    6m 52s
    After completing this video, you will be able to list common password best practices such as using complex passwords, enabling expiration requirements, and basic input/output system (BIOS)/unified extensible firmware interface (UEFI) passwords. FREE ACCESS
  • Locked
    12.  End User Best Practices
    8m 13s
    Upon completion of this video, you will be able to list best practices that end users can follow to ensure a safe computing environment. FREE ACCESS
  • Locked
    13.  Account Management Fundamentals
    7m 2s
    After completing this video, you will be able to recognize account management fundamentals including restricting login times, disabling user accounts, enabling failed attempts lockout, and using screen locks. FREE ACCESS
  • Locked
    14.  Administrator Credentials
    4m 31s
    In this video, you will learn how to handle the administrator account, including renaming the account and changing the default password. FREE ACCESS
  • Locked
    15.  AutoRun and AutoPlay
    5m 15s
    In this video, you will learn the difference between autorun and autoplay and when to disable these features. FREE ACCESS
  • Locked
    16.  Course Summary
    1m 16s
    baa34c44-b606-4c69-ba00-ab1cdda4653a FREE ACCESS

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Rating 4.6 of 54 users Rating 4.6 of 54 users (54)
Rating 4.6 of 85 users Rating 4.6 of 85 users (85)
Rating 4.7 of 27 users Rating 4.7 of 27 users (27)

PEOPLE WHO VIEWED THIS ALSO VIEWED THESE

Rating 4.6 of 248 users Rating 4.6 of 248 users (248)
Rating 4.6 of 127 users Rating 4.6 of 127 users (127)
Rating 4.5 of 1341 users Rating 4.5 of 1341 users (1341)