RSSCompTIA A+ 220-1002

Data Destruction and Disposal – CompTIA A+ 220-1002 – 2.9

Data Destruction and Disposal – CompTIA A+ 220-1002 – 2.9

| June 10, 2019

Disposing of a storage drive is important for keeping confidential data safe and secure. In this video, you’ll learn how to properly dispose of storage drives, how to securely format data, and methods for securely deleting individual files. << Previous Video: Securing Mobile Devices Next: Securing a SOHO Network >> If you’re getting rid of […]

Continue Reading

Securing Mobile Devices – CompTIA A+ 220-1002 – 2.8

Securing Mobile Devices – CompTIA A+ 220-1002 – 2.8

| June 10, 2019

We rely on our mobile devices to securely store our personal information. In this video, you’ll learn about the security technologies that are used in our mobile phones and tablet devices. << Previous Video: Workstation Security Best Practices Next: Data Destruction and Disposal >> If you set down your phone, you don’t want to give […]

Continue Reading

Workstation Security Best Practices – CompTIA A+ 220-1002 – 2.7

Workstation Security Best Practices – CompTIA A+ 220-1002 – 2.7

| June 10, 2019

Keeping your workstation secure is important at both work and home. In this video, you’ll learn some best practices for securing your computer and data. << Previous Video: Windows Security Settings Next: Securing Mobile Devices >> The first line of attack, when we’re referring to security on a workstation, is your password. You want to […]

Continue Reading

Windows Security Settings – CompTIA A+ 220-1002 – 2.6

Windows Security Settings – CompTIA A+ 220-1002 – 2.6

| June 10, 2019

The Windows operating system includes many different security features. In this video, you’ll learn about NTFS vs. Share permissions, explicit and inherited permissions, user authentication, encryption technologies, and much more. << Previous Video: Non-compliant Systems Next: Workstation Security Best Practices >> There are many different security technologies built into the Windows operating system. And in […]

Continue Reading

Non-compliant Systems – CompTIA A+ 220-1002 – 2.5

Non-compliant Systems – CompTIA A+ 220-1002 – 2.5

| June 9, 2019

One non-compliant system can be the weak link in your security armor. In this video, you’ll learn about non-compliant systems and how to protect your network against these bad apples. << Previous Video: Spoofing Next: Windows Security Settings >> When systems are deployed in an organization, the IT department has had a chance to perform […]

Continue Reading

Spoofing – CompTIA A+ 220-1002 – 2.5

Spoofing – CompTIA A+ 220-1002 – 2.5

| June 9, 2019

A spoofing attack allows an attacker to avoid detection through impersonation. In this video, you’ll learn how IP spoofing and MAC spoofing can be used to circumvent existing security technologies. << Previous Video: Brute Force Attacks Next: Non-compliant Systems >> The term spoofing is used to describe when you pretend to be something you aren’t. […]

Continue Reading

Brute Force Attacks – CompTIA A+ 220-1002 – 2.5

Brute Force Attacks – CompTIA A+ 220-1002 – 2.5

| June 9, 2019

If you don’t know the password, your only option is to guess. In this video, you’ll learn about brute-force attacks and how they can be made more efficient with dictionary attacks and rainbow tables. << Previous Video: Man-in-the-Middle Next: Spoofing >> If you were to see the storage of user names and passwords on a […]

Continue Reading

Man-in-the-Middle – CompTIA A+ 220-1002 – 2.5

Man-in-the-Middle – CompTIA A+ 220-1002 – 2.5

| June 9, 2019

A man-in-the-middle attack allows the attacker to invisibly watch everything you’re doing. In this video, you’ll learn about man-in-the-middle attacks and how one type of man-in-the-middle attack can take advantage of ARP traffic. << Previous Video: Zero-day Attacks Next: Brute Force Attacks >> What if there was a way for an attacker to get in […]

Continue Reading

Zero-Day Attacks – CompTIA A+ 220-1002 – 2.5

Zero-Day Attacks – CompTIA A+ 220-1002 – 2.5

| June 9, 2019

The worst attacks are the ones you don’t know about. In this video, you’ll learn about zero-day attacks and some real-world zero-day vulnerabilities. << Previous Video: Denial of Service Next: Man-in-the-Middle >> There are operating systems and applications that you are using right now that contain vulnerabilities. The problem is that we don’t know what […]

Continue Reading

Denial of Service – CompTIA A+ 220-1002 – 2.5

Denial of Service – CompTIA A+ 220-1002 – 2.5

| May 30, 2019

A properly placed denial of service attack can shut down a business. In this video, you’ll learn about the different DoS attacks and how they can be distributed using botnets. << Previous Video: Social Engineering Attacks Next: Zero-Day Attacks >> A denial of service is when some type of external force is causing a service […]

Continue Reading

X