There are policies in place to allow you to log into a computer and set the security to keep non-authorized personnel from accessing that data. These policies and procedures are demonstrated in this course.
Authenticating to a Windows host has to do with the way you log into it. All different ways Microsoft has created for you to log into your computer are discussed, including usernames and passwords, biometrics, picture passwords and PINs. There’s also a demonstration on how to use a Windows DVD to reset your Windows 10 host password on your computer in case it gets lost, or someone resets it.
Password PoliciesDuration: 3:37
Policies that regulate passwords in Windows 10 are analyzed.
Password Policy DemoDuration: 8:45
Policies that regulate passwords in Windows 10 are demonstrated.
Picture Passwords and PINsDuration: 4:58
Alternatives to user names and passwords are discussed, such as pictures for authentication.
Credential Manager DemoDuration: 4:43
Credential Manager is examined in Windows 10 for web browsing.
Credential GuardDuration: 2:01
Credential Guard used in Hyper-V is discussed.
Credential Guard DemoDuration: 2:42
A demonstration of Credential Guard using Hyper-V is shown to help protect your virtual machines.
Microsoft PassportDuration: 2:21
Microsoft Passport and Windows Hello security features are analyzed.
Password Hack ResetDuration: 8:12
A demonstration is provided of how to reset a Windows 10 password in case your password has been maliciously reset or just forgotten.
Meet the author
Robert McMillen started his career as an IT administrator for a manufacturing company after earning his CompTIA A+. He quickly learned how to fix and troubleshoot desktops and laptops, but his real passions were networking and server administration. Shortly after, he earned his first MCSE and Cisco CCNA and has continued with various certifications over the years (now over 50). He earned a Microsoft Certified Trainer certification and seven MCSEs. He started a successful consulting company in 2001 and eventually sold it in 2017 to focus on teaching networking and security in college and being a video and book author. Some interesting jobs he's performed include restoring the Enron emails for the Justice Department, training troops headed to Iraq on network security, and managing a billion dollar merger of Cisco network and Microsoft technologies.
You're in good company
"Comparing Infosec to other vendors is like comparing apples to oranges. My instructor was hands-down the best I’ve had."
"I knew Infosec could tell me what to expect on the exam and what topics to focus on most."
"I’ve taken five boot camps with Infosec and all my instructors have been great."