Entire Course Link
You are a security administrator responsible for providing secure configuration requirements for new laptop deployments. After reading Module 2 of Certified Secure Computer User v2exercises, apply the configuration settings below on your Windows® or Mac® computer and take screenshots of each step:
Paste screenshots into a Microsoft® Word document to demonstrate you applied the configurations.
Write a 1-page explanation on how and why these settings create a secure operating system.
Submit your assignment using the Assignment Files tab.