SY0-601 Videos

Threat Actors – SY0-601 CompTIA Security+ : 1.5

here are many different sources of threats with many different motivations for attacking your network. In this video, you’ll learn about threat actors and the differences between these different types of attacker. << Previous Video: Malicious Scripts Next: Attack Vectors >> The definition of a threat actor is an entity responsible for an event that …

Threat Actors – SY0-601 CompTIA Security+ : 1.5 Read More »

Malicious Scripts – SY0-601 CompTIA Security+ : 1.4

An attacker might use different scripting methods depending on the situation. In this video, you’ll learn about PowerShell scripts, Python, shell scripts, macros, and Visual Basic for Applications (VBA). << Previous Video: Denial of Service Next: Threat Actors >> If you’ve ever done any type of automation or scripting with an operating system or devices …

Malicious Scripts – SY0-601 CompTIA Security+ : 1.4 Read More »

Denial of Service – SY0-601 CompTIA Security+ : 1.4

An attacker can use many different techniques to cause a service to become unavailable. In this video, you’ll learn about denial of service, distributed DoS, DDoS amplification, application DoS, and operational technology DoS. << Previous Video: DNS Attacks Next: Malicious Scripts >>     A Denial of Service is when an attacker causes a service …

Denial of Service – SY0-601 CompTIA Security+ : 1.4 Read More »

MAC Flooding and Cloning – SY0-601 CompTIA Security+ : 1.4

An attacker can sometimes manipulate network traffic to gain unauthorized access to information. In this video, you’ll learn about MAC flooding and MAC cloning or spoofing. << Previous Video: On-Path Attacks Next: DNS Attacks >>     In networking, the term MAC address refers to the Media Access Control address of a network card. We …

MAC Flooding and Cloning – SY0-601 CompTIA Security+ : 1.4 Read More »

Randomizing Cryptography – SY0-601 CompTIA Security+ : 1.4

Cryptography isn’t very useful without randomization. In this video, you’ll learn about cryptographic nonces, initialization vectors, and salting. << Previous Video: RFID and NFC Attacks Next: On-Path Attacks >>     One of the core elements of cryptography is that there is a sufficient amount of randomization that the resulting encrypted data looks nothing like …

Randomizing Cryptography – SY0-601 CompTIA Security+ : 1.4 Read More »

RFID and NFC Attacks – SY0-601 CompTIA Security+ : 1.4

RFID and NFC have become common technologies on our mobile devices. In this video, you’ll learn about security concerns associated with RFID and NFC and what type of attacks might be associated with these technologies. << Previous Video: Wireless Jamming Next: Randomizing Cryptography >>     RFID stands for Radio-Frequency Identification. And it’s a technology …

RFID and NFC Attacks – SY0-601 CompTIA Security+ : 1.4 Read More »

Wireless Jamming – SY0-601 CompTIA Security+ : 1.4

A wireless network relies on a clear frequency spectrum for optimal operation. In this video, you’ll learn about different wireless jamming techniques and how to locate the source of the interference. << Previous Video: Wireless Disassociation Attacks Next: RFID and NFC Attacks >> Radio frequency jamming, or RF jamming, is a way for an attacker …

Wireless Jamming – SY0-601 CompTIA Security+ : 1.4 Read More »

Wireless Disassociation Attacks – SY0-601 CompTIA Security+ : 1.4

An encrypted wireless network may not stop all types of attacks. In this video, I’ll demonstrate a wireless disassociation attacks and you’ll learn how to prevent them. << Previous Video: Bluejacking and Bluesnarfing Next: Wireless Jamming >> Let’s say you’re using your wireless network and it’s working exactly the way you would expect, except suddenly …

Wireless Disassociation Attacks – SY0-601 CompTIA Security+ : 1.4 Read More »