SY0-601 Videos

Cross-site Scripting – SY0-601 CompTIA Security+ : 1.3

Cross-site scripting takes advantaged of a trusted browser to attack other systems. In this video, you’ll learn about reflected and stored XSS attacks and I’ll demonstrate a cross-site scripting attack on a vulnerable system. << Previous Video: Privilege Escalation Next: Injection Attacks >>     In this video, we’ll describe some techniques around cross-site scripting. […]

Cross-site Scripting – SY0-601 CompTIA Security+ : 1.3 Read More »

Privilege Escalation – SY0-601 CompTIA Security+ : 1.3

Some attacks can use an existing user account to gain elevated access. In this video, you’ll learn about privilege escalation vulnerabilities and how to prevent them. << Previous Video: Cryptographic Attacks Next: Cross-site Scripting >>     We often worry about an attacker getting administrative login rights or some type of route log in to

Privilege Escalation – SY0-601 CompTIA Security+ : 1.3 Read More »

Cryptographic Attacks – SY0-601 CompTIA Security+ : 1.2

Some attackers will use shortcomings in cryptographic protocols and techniques to gain access to data. In this video, you’ll learn about the birthday attack, hash collisions, and downgrade attacks. << Previous Video: Cloud-based vs. On-Premises Attacks Next: Privilege Escalation >>     Let’s say that you’ve encrypted some data, and you’ve put it into an

Cryptographic Attacks – SY0-601 CompTIA Security+ : 1.2 Read More »

Cloud-based vs. On-Premises Attacks – SY0-601 CompTIA Security+ : 1.2

Which is safer, a cloud-based infrastructure or an on-premises data center? In this video, you’ll learn about the advantages and disadvantages of securing data in both environments. << Previous Video: Supply Chain Attacks Next: Cryptographic Attacks >>     There are two schools of thought when it comes to data security. One school says, if

Cloud-based vs. On-Premises Attacks – SY0-601 CompTIA Security+ : 1.2 Read More »

Supply Chain Attacks – SY0-601 CompTIA Security+ : 1.2

Supply chain attacks are designed to affect many victims from one broad attack vector. In this video, you’ll learn about supply chain attacks and how companies are managing their supply chains. << Previous Video: Adversarial Artificial Intelligence Next: Cloud-based vs. On-Premises Attacks >>     The supply chain is the chain of manufacturing that gets

Supply Chain Attacks – SY0-601 CompTIA Security+ : 1.2 Read More »

Adversarial Artificial Intelligence – SY0-601 CompTIA Security+ : 1.2

Attackers use many different techniques to manipulate artificial intelligence and the machine learning process. In this video, you’ll learn about poisoning training data, evasion attacks, and securing the learning algorithms. << Previous Video: Physical Attacks Next: Supply Chain Attacks >> We’re able to make our computers much smarter these days by using machine learning. Our

Adversarial Artificial Intelligence – SY0-601 CompTIA Security+ : 1.2 Read More »

Physical Attacks – SY0-601 CompTIA Security+ : 1.2

Attackers often use physical devices to assist with their attack. In this video, you’ll learn about the use of malicious USB cables, malicious flash drives, skimming, and card cloning. << Previous Video: Password Attacks Next: Adversarial Artificial Intelligence >> Attacks aren’t always done across the network. There are many attacks that are physical attacks. One

Physical Attacks – SY0-601 CompTIA Security+ : 1.2 Read More »

Password Attacks – SY0-601 CompTIA Security+ : 1.2

There are many different techniques that the attackers can use to find your password. In this video, you’ll learn about spraying attacks, brute force attacks, hashing, dictionary attacks, rainbow tables, salt, and more. << Previous Video: Logic Bombs Next: Physical Attacks >> An attacker loves applications that store passwords as plain text. They take the

Password Attacks – SY0-601 CompTIA Security+ : 1.2 Read More »