Free CompTIA Security+ Training

Physical Attacks video title page

Physical Attacks – CompTIA Security+ SY0-701 – 2.4

Some attacks take advantage of vulnerabilities in our physical world. In this video, you’ll learn about brute force attacks, RFID cloning, and environmental attacks. << Previous Video: Other Malware Types Next Video: Denial of Service >> In this course, we’ve talked a lot about technology and how attackers can circumvent different aspects of our operating

Physical Attacks – CompTIA Security+ SY0-701 – 2.4 Read More »

An Overview of Malware video title page

An Overview of Malware – CompTIA Security+ SY0-701 – 2.4

Malware is a significant security concern on our modern networks. In this video, you’ll learn how malware and ransomware is used in cybersecurity attacks. << Previous Video: Zero-day Vulnerabilities Next Video: Viruses and Worms >> Malware is a very broad term. But it effectively describes any type of software that is doing bad things to

An Overview of Malware – CompTIA Security+ SY0-701 – 2.4 Read More »

Zero-day Vulnerabilities video title page

Zero-day Vulnerabilities – CompTIA Security+ SY0-701 – 2.3

An attack can sometimes take us by surprise. In this video, you’ll learn about zero-day attacks and how to prepare and respond to these attacks. << Previous Video: Mobile Device Vulnerabilities Next Video: An Overview of Malware >> The applications and operating systems that you’re using right now most likely have security vulnerabilities inside of

Zero-day Vulnerabilities – CompTIA Security+ SY0-701 – 2.3 Read More »

Mobile Device Vulnerabilities video title page

Mobile Device Vulnerabilities – CompTIA Security+ SY0-701 – 2.3

Our mobile devices can be used by attackers to gain access to our networks and data. In this video, you’ll learn about jailbreaking, rooting, and sideloading. << Previous Video: Misconfiguration Vulnerabilities Next Video: Zero-day Vulnerabilities >> To say that our mobile devices are challenging to secure is probably an understatement. These are devices that often

Mobile Device Vulnerabilities – CompTIA Security+ SY0-701 – 2.3 Read More »

Misconfiguration Vulnerabilities video title page

Misconfiguration Vulnerabilities – CompTIA Security+ SY0-701 – 2.3

Some of the most common vulnerabilities are those we create ourselves. In this video, you’ll learn many different ways that misconfigurations can weaken the security of our networks. << Previous Video: Supply Chain Vulnerabilities Next Video: Mobile Device Vulnerabilities >> One very easy way to get your data into the hands of the attacker is

Misconfiguration Vulnerabilities – CompTIA Security+ SY0-701 – 2.3 Read More »

Supply Chain Vulnerabilities video title page

Supply Chain Vulnerabilities – CompTIA Security+ SY0-701 – 2.3

Some attacks come in through the front door. In this video, you’ll learn how the supply chain can be used as an attack vector against our organizations. << Previous Video: Cloud-specific Vulnerabilities Next Video: Misconfiguration Vulnerabilities >> The supply chain involves the process of getting a product from the very beginning raw materials all the

Supply Chain Vulnerabilities – CompTIA Security+ SY0-701 – 2.3 Read More »