CompTIA A+ 220-1102

Zero-Day Attacks – CompTIA A+ 220-1102 – 2.4

Our applications and operating systems may have vulnerabilities inside that we simply haven’t discovered yet. In this video, you’ll learn about zero-day attacks and how to protect against them. << Previous Video: Denial of Service Next Video: On-Path Attacks >> The operating systems and applications that you use every day may have a security vulnerability

Zero-Day Attacks – CompTIA A+ 220-1102 – 2.4 Read More »

Social Engineering – CompTIA A+ 220-1102 – 2.4

Social engineering can circumvent security controls without using any technology. In this video, you’ll learn about phishing, shoulder surfing, piggybacking, wireless evil twins, and more. << Previous Video: Anti-Malware Tools Next Video: Denial of Service >> Attacks that involve social engineering are constantly evolving. Attackers are finding new ways to engage with people to get

Social Engineering – CompTIA A+ 220-1102 – 2.4 Read More »

Anti-Malware Tools – CompTIA A+ 220-1102 – 2.3

There are a number of different strategies for identifying and removing malware. In this video, you’ll learn about the Windows Recovery Environment, software firewalls, anti-phishing education, and OS reinstallation. << Previous Video: Malware Next Video: Social Engineering >> If you need to remove malware from a Windows computer, one way to go about doing that

Anti-Malware Tools – CompTIA A+ 220-1102 – 2.3 Read More »

Active Directory – CompTIA A+ 220-1102 – 2.1

The Active Directory database maintained by Windows Domain Services is a core component of any large Windows installation. In this video, you’ll learn about Active Directory, Domain Services, Organizational Units (OUs), login scripts, Group Policy, home folders, folder redirection, and security groups. << Previous Video: Logical Security Next Video: Wireless Encryption >> In this course,

Active Directory – CompTIA A+ 220-1102 – 2.1 Read More »

Logical Security – CompTIA A+ 220-1102 – 2.1

There are many techniques to enhance the logical security on your computing systems. In this video, you’ll learn about least privilege, access control lists, multi-factor authentication, email filtering, and more. << Previous Video: Physical Security for Staff Next Video: Active Directory >> Least privilege is an important concept in IT security because it determines exactly

Logical Security – CompTIA A+ 220-1102 – 2.1 Read More »