
Course Overview
Explore the policies in place to allow you to set security and keep non-authorized personnel from accessing data.
There are many ways to log into a computer such as two-factor authentication (2FA), picture passwords and PINs. In this course, you’ll explore discussions and demos show the security values of each type.