CompTIA Security+ SY0-701

Malicious Updates video title page

Malicious Updates – CompTIA Security+ SY0-701 – 2.3

Many operating systems and applications perform automated updates. In this video, you’ll learn how attackers can use this feature to gain access to our systems. << Previous Video: Race Conditions Next Video: Operating System Vulnerabilities >> You often hear myself and many other security professionals tell you to always keep your operating systems up to […]

Malicious Updates – CompTIA Security+ SY0-701 – 2.3 Read More »

Race Conditions video title page

Race Conditions – CompTIA Security+ SY0-701 – 2.3

Most applications perform multiple transactions and processes at the same time. In this video, you’ll learn how attackers can take advantage of this characteristic with a race condition. << Previous Video: Buffer Overflows Next Video: Malicious Updates >> A race condition is when two events happen at nearly the same time with an application, and

Race Conditions – CompTIA Security+ SY0-701 – 2.3 Read More »

Memory Injections video title page

Memory Injections – CompTIA Security+ SY0-701 – 2.3

Attackers can manipulate information in RAM to gain elevated access. In this video, you’ll learn how memory and DLL injections are used in an attack. << Previous Video: Other Social Engineering Attacks Next Video: Buffer Overflows >> The software that runs on your computer all runs inside of memory. Nothing executes on your computer unless

Memory Injections – CompTIA Security+ SY0-701 – 2.3 Read More »

Other Social Engineering Attacks video title page

Other Social Engineering Attacks – CompTIA Security+ SY0-701 – 2.2

Attackers use many techniques to gain access to our systems. In this video, you’ll learn about misinformation campaigns and brand impersonation. << Previous Video: Watering Hole Attacks Next Video: Memory Injections >> One very effective social engineering technique is to disseminate incorrect information to others. Unlike something that’s a difference of opinion, misinformation and disinformation

Other Social Engineering Attacks – CompTIA Security+ SY0-701 – 2.2 Read More »

Impersonation video title page

Impersonation – CompTIA Security+ SY0-701 – 2.2

Attackers use impersonation to make themselves appear to be someone different. In this video, you’ll learn about some of the most popular impersonation and fraud-based attacks. << Previous Video: Phishing Next Video: Watering Hole Attacks >> Let’s step through a number of different phone calls that have been received by individuals with this particular pretext.

Impersonation – CompTIA Security+ SY0-701 – 2.2 Read More »