There are policies in place to allow you to log into a computer and set the security to keep non-authorized personnel from accessing that data. These policies and procedures are demonstrated in this course.
Authenticating to a Windows host has to do with the way you log into it. All different ways Microsoft has created for you to log into your computer are discussed, including usernames and passwords, biometrics, picture passwords and PINs. There’s also a demonstration on how to use a Windows DVD to reset your Windows 10 host password on your computer in case it gets lost, or someone resets it.
Password PoliciesDuration: 3:37
Policies that regulate passwords in Windows 10 are analyzed.
Password Policy DemoDuration: 8:45
Policies that regulate passwords in Windows 10 are demonstrated.
Picture Passwords and PINsDuration: 4:58
Alternatives to user names and passwords are discussed, such as pictures for authentication.
Credential Manager DemoDuration: 4:43
Credential Manager is examined in Windows 10 for web browsing.
Credential GuardDuration: 2:01
Credential Guard used in Hyper-V is discussed.
Credential Guard DemoDuration: 2:42
A demonstration of Credential Guard using Hyper-V is shown to help protect your virtual machines.
Microsoft PassportDuration: 2:21
Microsoft Passport and Windows Hello security features are analyzed.
Password Hack ResetDuration: 8:12
A demonstration is provided of how to reset a Windows 10 password in case your password has been maliciously reset or just forgotten.
Meet the author
Robert McMillen started his career as an IT administrator for a manufacturing company after earning his CompTIA A+. He quickly learned how to fix and troubleshoot desktops and laptops, but his real passions were networking and server administration. Shortly after, he earned his first MCSE and Cisco CCNA and has continued with various certifications over the years (now over 50). He earned a Microsoft Certified Trainer certification and seven MCSEs. He started a successful consulting company in 2001 and eventually sold it in 2017 to focus on teaching networking and security in college and being a video and book author. Some interesting jobs he's performed include restoring the Enron emails for the Justice Department, training troops headed to Iraq on network security, and managing a billion dollar merger of Cisco network and Microsoft technologies.
You're in good company
Infosec Skills is a very good place for building technical acumen and engineering development knowledge. It enables us to provide training to the entire team on relevant topics.
Romy Ricafort, West Division Senior Director of Sales Engineering
Comparing Infosec to other vendors is like comparing apples to oranges. My instructor was hands-down the best I've had.
James Coyle , Senior U.S. Public Sector Channel Sales Engineer
Train on your schedule
- 600+ courses
- 100s of hands-on labs and projects
- 70+ role-based learning paths
- Skill assessments
- Custom learning paths
- Custom certification practice exams
- Cloud-hosted cyber ranges
- Infosec peer community support
Infosec Skills Teams
- All Infosec Skills content for the year
- Team boot camp discounts — online or onsite (not included with subscription)
- Team administration and reporting
- Custom team learning paths
- Transferable licenses
- Dedicated client success manager
Award-winning training that you can trust
Best Software - Highest Satisfaction
Best IT Security-related Training Program
Best Cybersecurity Education Provider & Best Security Education Platform
Most Innovative Product - Cybersecurity Training for Infosec Professionals
Global Excellence - Cyber Security Education & Training
Exceptional learning experiences powered by LX Labs cyber expertise
Infosec Skills courses and labs are powered by LX Labs — our elite team of cyber SMEs, learning specialists and community of top-ranked security instructors, published authors and sought-after industry leaders. We rigorously vet all Infosec Skills training resources to guarantee they meet certification and compliance requirements and align with recognized guidelines like the NICE Cybersecurity Workforce Framework.