CompTIA Security+ SY0-601

Trojan and RATs – SY0-601 CompTIA Security+ : 1.2

Malware can often find its way onto your system through misdirection. In this video, you’ll learn about Trojan horses, potentially unwanted programs (PUPs), backdoors, RATs, and more. << Previous Video: Ransomware and Crypto-malware Next: Rootkits >>     In history, a Trojan horse was a large wooden horse that was used by the Greeks to …

Trojan and RATs – SY0-601 CompTIA Security+ : 1.2 Read More »

Ransomware and Crypto-malware – SY0-601 CompTIA Security+ : 1.2

How valuable is your data? In this video, you’ll learn how attackers use ransomware to force users into exchanging money for their important files. << Previous Video: Viruses and Worms Next: Trojans and RATs >>     Very often, the most valuable thing we own is our data. This may be documents that we keep …

Ransomware and Crypto-malware – SY0-601 CompTIA Security+ : 1.2 Read More »

Viruses and Worms – SY0-601 CompTIA Security+ : 1.2

A computer virus can cause significant problems on a system. In this video, you’ll learn about viruses, fileless viruses, and how worms can be used to infect other systems without any human intervention. << Previous Video: An Overview of Malware Next: Ransomware and Crypto-malware >>     A virus is malware that can reproduce itself, …

Viruses and Worms – SY0-601 CompTIA Security+ : 1.2 Read More »

An Overview of Malware – SY0-601 CompTIA Security+ : 1.2

Malware comes in many types and forms. In this video, you’ll learn about malware types, methods, and the process that malware uses to infect your system. << Previous Video: Principles of Social Engineering Next: Viruses and Worms >>     Malware is malicious software. It’s software that is going to do something that will probably …

An Overview of Malware – SY0-601 CompTIA Security+ : 1.2 Read More »

Principles of Social Engineering – SY0-601 CompTIA Security+ : 1.1

Social engineering attackers know how to convince their victims to get information. In this video, you’ll learn the principles of social engineering and how to watch for these methods of manipulation. << Previous Video: Other Social Engineering Attacks Next: An Overview of Malware >>     Social engineering is a constantly changing attack, and that’s …

Principles of Social Engineering – SY0-601 CompTIA Security+ : 1.1 Read More »

Other Social Engineering Attacks – SY0-601 CompTIA Security+ : 1.1

Social engineering attacks can come from anywhere at any time. In this video, you’ll learn about tailgating, invoice scams, and credential harvesting. << Previous Video: Influence Campaigns Next: Principles of Social Engineering >>     If you work in an office where you badge in to unlock a door to gain access to the inside, …

Other Social Engineering Attacks – SY0-601 CompTIA Security+ : 1.1 Read More »

Watering Hole Attacks – SY0-601 CompTIA Security+ : 1.1

A cybersecurity professional has to be prepared at home and away. In this video, you’ll learn about watering hole attacks and how an attacker can use a third-party to gain access to your network. << Previous Video: Hoaxes Next: Spam >>     An organization that is very secure creates a problem for attackers. They’re …

Watering Hole Attacks – SY0-601 CompTIA Security+ : 1.1 Read More »