Overview

At the perimeter of our environments reside our workstations. As part of a secure environment, we should know the approaches that harden the systems of our end users.

  • Describe common browser security settings
  • Describe Windows 10 security options

Instructor: Raymond Lacoste

Secured Workstations

  • Securing Firefox for Your Organization
  • Securing Google Chrome for Your Organization
  • Securing Microsoft Edge for Your Organization
  • Securing Windows 10 Workstations