CompTIA A+ 220-1102

Insider Threats – CompTIA A+ 220-1102 – 2.4

A significant security challenges comes from inside the organization itself. In this video, you’ll learn about insider threats and how insiders are recruited by attackers to provide access to an organization’s private data. << Previous Video: Password Attacks Next Video: SQL Injection >> Insider threats are a remarkably difficult problem to protect against. People inside

Insider Threats – CompTIA A+ 220-1102 – 2.4 Read More »

Password Attacks – CompTIA A+ 220-1102 – 2.4

Attackers know that the password is often the only security feature preventing access to your private information. In this video, you’ll learn about secure password storage, brute force attacks, and dictionary attacks. << Previous Video: On-Path Attacks Next Video: Insider Threats >> Our passwords are often the only credential that’s preventing somebody from gaining access

Password Attacks – CompTIA A+ 220-1102 – 2.4 Read More »

Zero-Day Attacks – CompTIA A+ 220-1102 – 2.4

Our applications and operating systems may have vulnerabilities inside that we simply haven’t discovered yet. In this video, you’ll learn about zero-day attacks and how to protect against them. << Previous Video: Denial of Service Next Video: On-Path Attacks >> The operating systems and applications that you use every day may have a security vulnerability

Zero-Day Attacks – CompTIA A+ 220-1102 – 2.4 Read More »

Social Engineering – CompTIA A+ 220-1102 – 2.4

Social engineering can circumvent security controls without using any technology. In this video, you’ll learn about phishing, shoulder surfing, piggybacking, wireless evil twins, and more. << Previous Video: Anti-Malware Tools Next Video: Denial of Service >> Attacks that involve social engineering are constantly evolving. Attackers are finding new ways to engage with people to get

Social Engineering – CompTIA A+ 220-1102 – 2.4 Read More »

Anti-Malware Tools – CompTIA A+ 220-1102 – 2.3

There are a number of different strategies for identifying and removing malware. In this video, you’ll learn about the Windows Recovery Environment, software firewalls, anti-phishing education, and OS reinstallation. << Previous Video: Malware Next Video: Social Engineering >> If you need to remove malware from a Windows computer, one way to go about doing that

Anti-Malware Tools – CompTIA A+ 220-1102 – 2.3 Read More »