Professor Messer

Professor Messer’s CompTIA A+ Study Group – November 2017

Professor Messer’s A+ Core 1 Course Notes: Click here to learn about my Core 1 and Core 2 A+ downloadable PDF Course Notes. Professor Messer’s 220-1001 Core 1 A+ Practice Exams: Are you ready for your 220-1001 exam? Click here to learn about my 220-1001 Core 1 A+ Practice Exams. CompTIA Exam Objectives – http://www.professormesser.com/objectives/ […]

Professor Messer’s CompTIA A+ Study Group – November 2017 Read More »

Denial of Service – CompTIA Security+ SY0-501 – 1.2

If your services aren’t working, then you are effectively out of business. In this video, you’ll learn how denial of service attacks are used to prevent access to your important business systems. << Previous Video: Principles of Social Engineering Next: Man-in-the-Middle >>–> A denial of service is when the bad guys are taking a service

Denial of Service – CompTIA Security+ SY0-501 – 1.2 Read More »

Principles of Social Engineering – CompTIA Security+ SY0-501 – 1.2

Someone who’s well-versed in social engineering can easily talk their way into your network. In this video, you’ll learn about social engineering principles and what you can look for to protect against these attacks. << Previous Video: Watering Hole Attacks Next: Denial of Service >> Social engineering is a very low tech form of a

Principles of Social Engineering – CompTIA Security+ SY0-501 – 1.2 Read More »

Watering Hole Attacks – CompTIA Security+ SY0-501 – 1.2

If your network is secure, the bad guys might try to find an opening at the local watering hole. In this video, you’ll learn about watering hole attacks and how some real-world watering holes were poisoned by the bad guys. << Previous Video: Hoaxes Next: Principles of Social Engineering >> Let’s say you’ve been working

Watering Hole Attacks – CompTIA Security+ SY0-501 – 1.2 Read More »

Tailgating and Impersonation – CompTIA Security+ SY0-501 – 1.2

Even if you don’t have a key, it can be very easy to pass through a locked door. In this video, you’ll learn how the bad guys use tailgating and impersonation to gain access to buildings and information that normally wouldn’t be accessible. << Previous Video: Phishing Next: Dumpster Diving >> Tailgating is a technique

Tailgating and Impersonation – CompTIA Security+ SY0-501 – 1.2 Read More »