Data security in these videos is about protecting access from people who shouldn't have access. NTFS security and share permissions are covered so you know how to properly share files and folders securely for your Windows hosts.
Privacy laws require you keep any client data secure, and in the videos in this course, you’ll learn how to do this using NTFS security and share permissions. You’ll also learn how to calculate permissions when both types of security are applied to your Windows folders. You’ll also learn about file encryption and keeping viruses from executing when you plug in a device.
NTFS PermissionsDuration: 6:41
Permissions to files and folders in the security tab are discussed.
NTFS Permissions DemoDuration: 12:44
Permissions to files and folders in the security tab are demonstrated.
Share PermissionsDuration: 6:41
Share permissions are examined for users to open remotely.
Share Permissions DemoDuration: 15:33
Share permissions are demonstrated.
Data Execution Prevented (DEP)Duration: 8:16
Data Execution Prevented is analyzed on how it can protect your Windows 10 host.
DEP DemoDuration: 1:40
Data Execution Prevented is demonstrated on how it can protect your Windows 10 host.
Encrypted File System (EFS)Duration: 4:15
File and folder encryption are discussed to encrypt specific data on your Windows 10 host.
File and Folder Encryption DemoDuration: 6:57
File and folder encryption are demonstrated.
Data Encryption Using BitLocker (with or without TPM)Duration: 3:45
A demonstration of BitLocker to encrypt your entire hard drive.
BitLocker DemoDuration: 6:29
BitLocker is demonstrated.
Meet the author
Robert McMillen started his career as an IT administrator for a manufacturing company after earning his CompTIA A+. He quickly learned how to fix and troubleshoot desktops and laptops, but his real passions were networking and server administration. Shortly after, he earned his first MCSE and Cisco CCNA and has continued with various certifications over the years (now over 50). He earned a Microsoft Certified Trainer certification and seven MCSEs. He started a successful consulting company in 2001 and eventually sold it in 2017 to focus on teaching networking and security in college and being a video and book author. Some interesting jobs he's performed include restoring the Enron emails for the Justice Department, training troops headed to Iraq on network security, and managing a billion dollar merger of Cisco network and Microsoft technologies.
You're in good company
Infosec Skills is a very good place for building technical acumen and engineering development knowledge. It enables us to provide training to the entire team on relevant topics.
Romy Ricafort, West Division Senior Director of Sales Engineering
Comparing Infosec to other vendors is like comparing apples to oranges. My instructor was hands-down the best I've had.
James Coyle , Senior U.S. Public Sector Channel Sales Engineer
Train on your schedule
- 600+ courses
- 100s of hands-on labs and projects
- 70+ role-based learning paths
- Skill assessments
- Custom learning paths
- Custom certification practice exams
- Cloud-hosted cyber ranges
- Infosec peer community support
Infosec Skills Teams
- All Infosec Skills content for the year
- Team boot camp discounts — online or onsite (not included with subscription)
- Team administration and reporting
- Custom team learning paths
- Transferable licenses
- Dedicated client success manager
Award-winning training that you can trust
Best Software - Highest Satisfaction
Best IT Security-related Training Program
Best Cybersecurity Education Provider & Best Security Education Platform
Most Innovative Product - Cybersecurity Training for Infosec Professionals
Global Excellence - Cyber Security Education & Training
Exceptional learning experiences powered by LX Labs cyber expertise
Infosec Skills courses and labs are powered by LX Labs — our elite team of cyber SMEs, learning specialists and community of top-ranked security instructors, published authors and sought-after industry leaders. We rigorously vet all Infosec Skills training resources to guarantee they meet certification and compliance requirements and align with recognized guidelines like the NICE Cybersecurity Workforce Framework.