Authentication Mechanisms Course

There are policies in place to allow you to log into a computer and set the security to keep non-authorized personnel from accessing that data. These policies and procedures are demonstrated in this course.

37 minutes

Course description

Authenticating to a Windows host has to do with the way you log into it. All different ways Microsoft has created for you to log into your computer are discussed, including usernames and passwords, biometrics, picture passwords and PINs. There's also a demonstration on how to use a Windows DVD to reset your Windows 10 host password on your computer in case it gets lost, or someone resets it.

Syllabus

Password Hack Reset

Video - 00:08:00

A demonstration is provided of how to reset a Windows 10 password in case your password has been maliciously reset or just forgotten.
Microsoft Passport

Video - 00:02:00

Microsoft Passport and Windows Hello security features are analyzed.
Credential Guard Demo

Video - 00:03:00

A demonstration of Credential Guard using Hyper-V is shown to help protect your virtual machines.
Credential Guard

Video - 00:02:00

Credential Guard used in Hyper-V is discussed.
Credential Manager Demo

Video - 00:05:00

Credential Manager is examined in Windows 10 for web browsing.
Picture Passwords and PINs

Video - 00:05:00

Alternatives to user names and passwords are discussed, such as pictures for authentication.
Password Policy Demo

Video - 00:09:00

Policies that regulate passwords in Windows 10 are demonstrated.
Password Policies

Video - 00:04:00

Policies that regulate passwords in Windows 10 are analyzed.

Meet the author

Robert McMillen

Professor Robert McMillen is a college instructor with over 50 technical certifications. He has an MBA and teaches Computer Science at Portland based colleges. Robert has earned multiple MCSEs and an MCT from Microsoft. He is the owner of Tech Publishing, a Portland-based network new media company. Robert has over 20 years of experience in network engineering and earned certifications from companies like Microsoft, Checkpoint, IBM, and Cisco. Some of his higher profile jobs have been restoring email for the government to prosecute Enron executives, training the network vulnerability assessment team for the U.S. Army, and relocating the Xbox world for Microsoft.

Unlock 7 days of free training

  • 1,400+ hands-on courses and labs
  • Certification practice exams
  • Skill assessments

Associated NICE Work Roles

All Infosec training maps directly to the NICE Workforce Framework for Cybersecurity to guide you from beginner to expert across 52 Work Roles.

  • Exploitation Analyst
  • Cyber Operator
  • Law Enforcement / Counterintelligence Forensics Analyst

Plans & pricing

Infosec Skills Personal

$299 / year

  • 190+ role-guided learning paths (e.g., Ethical Hacking, Threat Hunting)
  • 100s of hands-on labs in cloud-hosted cyber ranges
  • Custom certification practice exams (e.g., CISSP, Security+)
  • Skill assessments
  • Infosec peer community support

Infosec Skills Teams

$799 per license / year

  • Team administration and reporting
  • Dedicated client success manager
  • Single sign-on (SSO)
    Easily authenticate and manage your learners by connecting to any identity provider that supports the SAML 2.0 standard.
  • Integrations via API
    Retrieve training performance and engagement metrics and integrate learner data into your existing LMS or HRS.
  • 190+ role-guided learning paths and assessments (e.g., Incident Response)
  • 100s of hands-on labs in cloud-hosted cyber ranges
  • Create and assign custom learning paths
  • Custom certification practice exams (e.g., CISSP, CISA)
  • Optional upgrade: Guarantee team certification with live boot camps

Learn about scholarships and financing with

Affirm logo

Award-winning training you can trust