CompTIA A+ 220-1102

Mobile Device Security – CompTIA A+ 220-1102 – 2.7

Our mobile devices include extensive security features. In this video, you’ll learn about screen locks, remote wiping, full device encryption, IoT security, and more. << Previous Video: Security Best Practices Next Video: Data Destruction >> If you use a mobile device, then you probably use some type of screen lock to limit someone from gaining […]

Mobile Device Security – CompTIA A+ 220-1102 – 2.7 Read More »

Windows Security Settings – CompTIA A+ 220-1102 – 2.5

Windows includes a number of different security features to keep your data safe. In this video, you’ll learn about authentication options, NTFS vs. Share permissions, implicit and explicit permissions, and more. << Previous Video: Windows Firewall Next Video: Security Best Practices >> Before you can use most operating systems, you have to log in, and

Windows Security Settings – CompTIA A+ 220-1102 – 2.5 Read More »

Windows Firewall – CompTIA A+ 220-1102 – 2.5

Windows Defender Firewall provides control of both incoming and outgoing data flows. In this video, you’ll learn about the Defender Firewall interface, enable and disable firewall settings, and create custom exceptions for data flows. << Previous Video: Defender Antivirus Next Video: Windows Security Settings >> Windows 10 of Windows 11 includes the Windows Defender Firewall,

Windows Firewall – CompTIA A+ 220-1102 – 2.5 Read More »

Defender Antivirus – CompTIA A+ 220-1102 – 2.5

Microsoft Defender Antivirus is included with Windows by default, and it’s important to know how to manage this service when troubleshooting. In this video, you’ll learn about activating, deactivating, and updating the virus definitions in Microsoft Defender Antivirus. << Previous Video: Security Vulnerabilities Next Video: Windows Firewall >> If you’re running Windows 10 or Windows

Defender Antivirus – CompTIA A+ 220-1102 – 2.5 Read More »

Security Vulnerabilities – CompTIA A+ 220-1102 – 2.4

There are many opportunities that an attacker might use to gain access to a system. In this video, you’ll learn about non-compliant systems, unpatched and unprotected systems, product support lifetimes, and the challenge of securing BYOD systems. << Previous Video: Cross-Site Scripting Next Video: Defender Antivirus >> If you were to look at the logs

Security Vulnerabilities – CompTIA A+ 220-1102 – 2.4 Read More »

Cross-site Scripting – CompTIA A+ 220-1102 – 2.4

A cross-site scripting attack allows an attacker to obtain access to a trusted third-party website. In this video, you’ll learn about cross-site scripting and view a demonstration of a cross-site scripting attack. << Previous Video: SQL Injection Next Video: Security Vulnerabilities >> In this video, we’ll look at ways that cross-site scripting can be used

Cross-site Scripting – CompTIA A+ 220-1102 – 2.4 Read More »

Insider Threats – CompTIA A+ 220-1102 – 2.4

A significant security challenges comes from inside the organization itself. In this video, you’ll learn about insider threats and how insiders are recruited by attackers to provide access to an organization’s private data. << Previous Video: Password Attacks Next Video: SQL Injection >> Insider threats are a remarkably difficult problem to protect against. People inside

Insider Threats – CompTIA A+ 220-1102 – 2.4 Read More »

Password Attacks – CompTIA A+ 220-1102 – 2.4

Attackers know that the password is often the only security feature preventing access to your private information. In this video, you’ll learn about secure password storage, brute force attacks, and dictionary attacks. << Previous Video: On-Path Attacks Next Video: Insider Threats >> Our passwords are often the only credential that’s preventing somebody from gaining access

Password Attacks – CompTIA A+ 220-1102 – 2.4 Read More »