Securing Workstations (FC0-U71)

Tech+ Domain

6.0 Security

Tech+ Objectives

6.2 Explain methods to secure devices and security best practices

Overview

Welcome to the Securing Workstations lab. In this lab, you will be provided with the instructions and devices needed to develop your hands-on skills.

Learning Outcomes:

In this lab, you will complete the following exercises:

  • Securing a Windows client workstation.


 

Key terms and descriptions

Security awareness
Security awareness refers to the knowledge and understanding of potential threats to safety and security, coupled with the ability to recognize, prevent, and respond to such threats.
Securing devices (mobile/workstation)
Securing devices, such as mobile phones and workstations, refers to implementing measures to protect these devices from unauthorized access, data breaches, malware, and other cybersecurity threats.
Device use best practices
Device use best practices refer to guidelines and habits that help users optimize the performance, security, and longevity of their devices, whether they're mobile phones, computers, tablets, or other gadgets. These practices ensure efficient and safe usage while minimizing risks like cyber threats, data loss, and hardware damage.
Privacy considerations
Privacy considerations refer to the careful evaluation and implementation of measures to protect individuals' personal information and ensure it is collected, stored, and shared responsibly.