Security Considerations

Microsoft System Center Configuration Manager 2012 R2    |    Intermediate
  • 13 videos | 55m 52s
  • Includes Assessment
  • Earns a Badge
Rating 4.6 of 19 users Rating 4.6 of 19 users (19)
Microsoft System Center Configuration Manager 2012 R2 is a systems management solution for large networks. Explore security considerations for connecting clients to SCCM, overall data integrity, and administrative delegation.

WHAT YOU WILL LEARN

  • Describe certificates
    Describe managing security features
    Describe pki certificate revocation
    Describe https client connections
    Implement https client connections
    Describe role-based security
    Describe security roles
  • Describe collections and administrative scopes
    Describe security scopes
    Describe object types within security scopes
    Describe assigning roles for administration
    Implement assigning roles for administration
    Use security roles

IN THIS COURSE

  • 4m 40s
    Upon completion of this video, you will be able to describe certificates. FREE ACCESS
  • 4m 2s
    After completing this video, you will be able to describe how to manage security features. FREE ACCESS
  • Locked
    3.  PKI Certificate Revocation
    4m 19s
    Upon completion of this video, you will be able to describe how to revoke a PKI certificate. FREE ACCESS
  • Locked
    4.  HTTPS Client Connections (Part 1)
    3m 4s
    Upon completion of this video, you will be able to describe HTTPS client connections. FREE ACCESS
  • Locked
    5.  HTTPS Client Connections (Part 2)
    6m 56s
    Learn how to implement HTTPS client connections. FREE ACCESS
  • Locked
    6.  Role-based Security
    4m 30s
    Upon completion of this video, you will be able to describe role-based security. FREE ACCESS
  • Locked
    7.  Security Roles
    2m 8s
    After watching this video, you will be able to describe security roles. FREE ACCESS
  • Locked
    8.  Collections and Administrative Scopes
    2m 29s
    Upon completion of this video, you will be able to describe collections and administrative scopes. FREE ACCESS
  • Locked
    9.  Security Scopes
    2m 43s
    After completing this video, you will be able to describe security scopes. FREE ACCESS
  • Locked
    10.  Object Types - Security Scopes
    1m 14s
    Upon completion of this video, you will be able to describe different types of objects within security scopes. FREE ACCESS
  • Locked
    11.  Assigning Roles for Administration (Part 1)
    4m 54s
    After completing this video, you will be able to describe how to assign roles for administration. FREE ACCESS
  • Locked
    12.  Assigning Roles for Administration (Part 2)
    8m 27s
    Find out how to assign roles for administration. FREE ACCESS
  • Locked
    13.  Exercise: Working with Security Roles
    6m 26s
    In this video, you will use security roles. FREE ACCESS

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Rating 4.5 of 44 users Rating 4.5 of 44 users (44)
Rating 4.4 of 17 users Rating 4.4 of 17 users (17)
Rating 4.6 of 123 users Rating 4.6 of 123 users (123)

PEOPLE WHO VIEWED THIS ALSO VIEWED THESE

Rating 4.1 of 43 users Rating 4.1 of 43 users (43)
Rating 4.8 of 66 users Rating 4.8 of 66 users (66)
Rating 4.5 of 1344 users Rating 4.5 of 1344 users (1344)