At the end of this course, students will be able to schedule and invite participants to zoom meetings, configure settings to keep the meeting secure, and control a meeting by stopping disruptions. You'll even learn how to schedule large public meetings to get the participants you need.
Course Curriculum
- 2.1 Introduction to the Zoom desktop app security settings section (1:05)
- 2.2 Verifying the app version and updating (2:02)
- 2.3 General settings (1:05)
- 2.4 Video settings (0:34)
- 2.5 Audio settings (0:23)
- 2.6 Screen share settings (0:32)
- 2.7 Recording settings (0:20)
- 2.8 Profile settings (0:30)
- 2.9 Accessibility settings (0:28)
- Section 2 Quiz
- Activity 2: Enable desktop app security settings
- 2.10 Conclusion: Your desktop app is now configured (0:30)
- 3.1 Introduction to the Zoom web portal security settings section (0:29)
- 3.2 Web portal organization (1:27)
- 3.3 Schedule meeting settings (5:41)
- 3.4 In meeting basic settings (5:28)
- 3.5 In meeting advanced settings (4:30)
- 3.6 Email notification settings (1:34)
- 3.7 Other settings (1:18)
- 3.8 Recording settings (4:04)
- 3.9 Telephone settings (0:36)
- Section 3 Quiz
- Activity 3: Enable web portal security settings
- 3.10 Conclusion: Your web portal is now configured (0:28)
- Copy of Activity 3: Enable web portal security settings
- 4.1 Introduction to the admin security settings section (0:26)
- 4.2 Organization of the admin security settings in the web portal (0:27)
- 4.3 Authentication settings (3:41)
- 4.4 Security settings (2:17)
- 4.5 Sign in methods (0:27)
- 4.6 Set up MFA (1:31)
- 4.7 Reset MFA (1:11)
- Section 4 Quiz
- Activity 4: Enable web portal admin settings configruations
- 4.8 Conclusion: Web portal admin security settings are now enabled (0:32)
- 6.1 Introduction to meeting registrations (0:30)
- 6.2 Reasons to use registrations (1:19)
- 6.3 Getting started with meeting registrations (0:45)
- 6.4 Schedule a meeting that requires registration (1:55)
- 6.5 Configure the registration (8:22)
- 6.6 Share the meeting registration info (3:50)
- 6.7 Approve or deny the registration (4:29)
- 6.8 Delete or modify a meeting requiring registration (2:45)
- Section 6 Quiz
- Activity 6: Schedule your first meeting that requires registrations
- 6.9 Conclusion: The power of participant registrations (0:36)
- 8.1 Introduction to stopping disruptive behavior (0:35)
- 8.2 Disruption stoppers: A walk through (1:09)
- 8.3 Displayed meeting info (the top left corner) (4:00)
- 8.4 Security menu options (3:07)
- 8.5 Participant controls (2:38)
- 8.6 Participant panel options (2:15)
- 8.7 The waiting room (2:43)
- 8.8 Screen sharing options (2:07)
- 8.9 Chat options (1:10)
- 8.10 Gallery view controls (2:14)
- 8.11 Co-host controls (1:33)
- 8.12 End the meeting (1:00)
- Section 8 Quiz
- Activity 8: Practice using the meeting controls
- 8.14 Conclusion: Don't fear meeting disruptions (0:51)
Hi, I’m Stacy Eldridge
Stacy Eldridge brings nearly 20 years of cybersecurity and digital investigative experience to her new business, Silicon Prairie Cyber Services LLC, where she focuses on breaking the code on data protection for businesses, their information, and their customers through consulting and education services. Stacy also provides data recovery and digital investigation services.
Stacy launched her security career in the Federal Bureau of Investigation by spending nearly a decade as a Senior Forensic Examiner on the Computer Analysis Response Team where she worked a variety of digital investigations such as intrusion, child exploitation, and terrorism. She was part of the team that secured the first material support of terrorism conviction. During Stacy’s last assignment at the FBI she was responsible for developing and delivering training to forensic examiners.
Stacy then spent five years building the data loss prevention program at General Electric while working closely with the insider threat team to use innovative technology and procedures to protect crown jewels and intellectual property for over 90,000 employees across the globe. Her team also worked to conduct swift investigations in the cases of loss.
Before launching her own company Stacy was working to protect critical infrastructure at Lincoln Electric System as the Cyber Security Manager responsible for developing strategies to protect both information technology systems and operational technology systems.
Stacy has also served as a coach for the International Association of Computer Investigative Specialists for a number of years and serves as an adjunct professor at the OSU Institute of Technology. Stacy has the following certifications: GSEC, GCCC, GCFE, ACE, and CFCE and received her Masters of Science from Bellevue University in 2006.
Learn more about this course
An introduction to the course and your instructor.