Security First Video Training Series
-
From Group IT Training Video April 7th, 2016
Links in this video:Protect IU website: protect.iu.edu Disaster Recovery Planning resources: go.iu.edu/dr-plan Business Continuity Planning help and resources:… -
From Group IT Training Video October 9th, 2015
Links in this video:IU Policy IT-12: go.iu.edu/it-12 Security configs for smart phones and tablets: kb.iu.edu/d/bcnh#phone Stolen device help: kb.iu.edu/d/avbx Clear… -
From Group IT Training Video October 9th, 2015
Links in this video:IU Policy IT-12: go.iu.edu/it-12 Unified Device Management (UDM) at IU: kb.iu.edu/d/bfhn UDM Service Overview: kb.iu.edu/d/beae Protect IU best… -
From Group IT Training Video October 9th, 2015
Links in this video:Policy DM-01: go.iu.edu/dm-01 Connecting to VPN: kb.iu.edu/d/aygt IP addresses at IUB & IUPUI: kb.iu.edu/d/ayft IP addresses at regional… -
From Group IT Training Video October 9th, 2015
Links in this video:IU Policy IT-12: go.iu.edu/it-12 Log-ALERT with Splunk configurations: kb.iu.edu/d/bflj IU Log-ALERT site: logalert.iu.edu Protect IU best practices… -
From Group IT Training Video October 28th, 2016
Links in this video: IU Policy IT-12: go.iu.edu/it-12 Protect IU website: protect.iu.edu Use a Less Privileged Account: go.iu.edu/accounts-priv The Principle of Least… -
From Group IT Training Video October 8th, 2015
Links in this video:Vulnerability scanners: go.iu.edu/web-scan Protect IU site: protect.iu.edu Security First site: securityfirst.iu.edu In this video, you'll…