CompTIA A+ 220-1102

Defender Antivirus – CompTIA A+ 220-1102 – 2.5

Microsoft Defender Antivirus is included with Windows by default, and it’s important to know how to manage this service when troubleshooting. In this video, you’ll learn about activating, deactivating, and updating the virus definitions in Microsoft Defender Antivirus. << Previous Video: Security Vulnerabilities Next Video: Windows Firewall >> If you’re running Windows 10 or Windows […]

Defender Antivirus – CompTIA A+ 220-1102 – 2.5 Read More »

Security Vulnerabilities – CompTIA A+ 220-1102 – 2.4

There are many opportunities that an attacker might use to gain access to a system. In this video, you’ll learn about non-compliant systems, unpatched and unprotected systems, product support lifetimes, and the challenge of securing BYOD systems. << Previous Video: Cross-Site Scripting Next Video: Defender Antivirus >> If you were to look at the logs

Security Vulnerabilities – CompTIA A+ 220-1102 – 2.4 Read More »

Cross-site Scripting – CompTIA A+ 220-1102 – 2.4

A cross-site scripting attack allows an attacker to obtain access to a trusted third-party website. In this video, you’ll learn about cross-site scripting and view a demonstration of a cross-site scripting attack. << Previous Video: SQL Injection Next Video: Security Vulnerabilities >> In this video, we’ll look at ways that cross-site scripting can be used

Cross-site Scripting – CompTIA A+ 220-1102 – 2.4 Read More »

Insider Threats – CompTIA A+ 220-1102 – 2.4

A significant security challenges comes from inside the organization itself. In this video, you’ll learn about insider threats and how insiders are recruited by attackers to provide access to an organization’s private data. << Previous Video: Password Attacks Next Video: SQL Injection >> Insider threats are a remarkably difficult problem to protect against. People inside

Insider Threats – CompTIA A+ 220-1102 – 2.4 Read More »

Password Attacks – CompTIA A+ 220-1102 – 2.4

Attackers know that the password is often the only security feature preventing access to your private information. In this video, you’ll learn about secure password storage, brute force attacks, and dictionary attacks. << Previous Video: On-Path Attacks Next Video: Insider Threats >> Our passwords are often the only credential that’s preventing somebody from gaining access

Password Attacks – CompTIA A+ 220-1102 – 2.4 Read More »

Zero-Day Attacks – CompTIA A+ 220-1102 – 2.4

Our applications and operating systems may have vulnerabilities inside that we simply haven’t discovered yet. In this video, you’ll learn about zero-day attacks and how to protect against them. << Previous Video: Denial of Service Next Video: On-Path Attacks >> The operating systems and applications that you use every day may have a security vulnerability

Zero-Day Attacks – CompTIA A+ 220-1102 – 2.4 Read More »

Social Engineering – CompTIA A+ 220-1102 – 2.4

Social engineering can circumvent security controls without using any technology. In this video, you’ll learn about phishing, shoulder surfing, piggybacking, wireless evil twins, and more. << Previous Video: Anti-Malware Tools Next Video: Denial of Service >> Attacks that involve social engineering are constantly evolving. Attackers are finding new ways to engage with people to get

Social Engineering – CompTIA A+ 220-1102 – 2.4 Read More »