Designing for Data Access & Protection

Windows 10    |    Expert
  • 13 videos | 52m 45s
  • Includes Assessment
  • Earns a Badge
After device protection comes proper access to data, including protection of remote data. Discover how to design for data access and protection, including planning shared resources, advanced audit policies, and file and folder access.


  • Design for file and disk encryption
    Design for bitlocker encryption
    Design for the network unlock feature
    Configure bitlocker policies
    Design for the encrypting file system recovery agent
    Manage encrypting file system
    Manage bitlocker certificates including backup and restores
  • Design for auditing using group policy and auditpol.ext
    Create expression-based audit policies
    Design for removable device audit policies
    Design for windows server dynamic access control
    Use web application proxy
    Use azure rights management service (rms)


  • 2m 42s
    Find out how to design for file and disk encryption. FREE ACCESS
  • 4m 27s
    To find out how to design for BitLocker encryption, consult a professional or search online for tutorials. FREE ACCESS
  • Locked
    3.  Network Unlock Feature
    5m 7s
    In this video, you will learn how to design for the network unlock feature. FREE ACCESS
  • Locked
    4.  BitLocker Policies
    3m 57s
    In this video, learn how to configure BitLocker policies. FREE ACCESS
  • Locked
    5.  EFS Recovery Agent
    4m 34s
    In this video, you will learn how to design for the Encrypting File System recovery agent. FREE ACCESS
  • Locked
    6.  Manage EFS
    3m 23s
    In this video, you will learn how to manage the Encrypting File System. FREE ACCESS
  • Locked
    7.  BitLocker Certificates
    3m 14s
    Find out how to manage BitLocker certificates, including backup and restores. FREE ACCESS
  • Locked
    8.  Group Policy and AuditPol.exe
    4m 25s
    In this video, you will learn how to design for auditing using Group Policy and the AuditPol.ext extension. FREE ACCESS
  • Locked
    9.  Expression-based Audit Policies
    4m 35s
    In this video, you will create audit policies based on expressions. FREE ACCESS
  • Locked
    10.  Removable Device Audit Policies
    3m 53s
    In this video, learn how to design policies for auditing removable devices. FREE ACCESS
  • Locked
    11.  Dynamic Access Control
    5m 7s
    In this video, learn how to design for Windows Server Dynamic Access Control. FREE ACCESS
  • Locked
    12.  Web Application Proxy
    3m 42s
    In this video, learn how to use the Web Application Proxy. FREE ACCESS
  • Locked
    13.  Rights Management Services
    3m 39s
    Learn how to use the Azure Rights Management Service (RMS). FREE ACCESS


Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.