CompTIA Security+ SY0-701

Other Malware Types video title page

Other Malware Types – CompTIA Security+ SY0-701 – 2.4

There are many other malware types than viruses or worms. In this video, you’ll learn about keyloggers, logic bombs, and rootkits. << Previous Video: Spyware and Bloatware Next Video: Physical Attacks >> Attackers know that a great deal of sensitive information is put into your computer using the keyboard. So this would be a great […]

Other Malware Types – CompTIA Security+ SY0-701 – 2.4 Read More »

An Overview of Malware video title page

An Overview of Malware – CompTIA Security+ SY0-701 – 2.4

Malware is a significant security concern on our modern networks. In this video, you’ll learn how malware and ransomware is used in cybersecurity attacks. << Previous Video: Zero-day Vulnerabilities Next Video: Viruses and Worms >> Malware is a very broad term. But it effectively describes any type of software that is doing bad things to

An Overview of Malware – CompTIA Security+ SY0-701 – 2.4 Read More »

Zero-day Vulnerabilities video title page

Zero-day Vulnerabilities – CompTIA Security+ SY0-701 – 2.3

An attack can sometimes take us by surprise. In this video, you’ll learn about zero-day attacks and how to prepare and respond to these attacks. << Previous Video: Mobile Device Vulnerabilities Next Video: An Overview of Malware >> The applications and operating systems that you’re using right now most likely have security vulnerabilities inside of

Zero-day Vulnerabilities – CompTIA Security+ SY0-701 – 2.3 Read More »

Mobile Device Vulnerabilities video title page

Mobile Device Vulnerabilities – CompTIA Security+ SY0-701 – 2.3

Our mobile devices can be used by attackers to gain access to our networks and data. In this video, you’ll learn about jailbreaking, rooting, and sideloading. << Previous Video: Misconfiguration Vulnerabilities Next Video: Zero-day Vulnerabilities >> To say that our mobile devices are challenging to secure is probably an understatement. These are devices that often

Mobile Device Vulnerabilities – CompTIA Security+ SY0-701 – 2.3 Read More »

Misconfiguration Vulnerabilities video title page

Misconfiguration Vulnerabilities – CompTIA Security+ SY0-701 – 2.3

Some of the most common vulnerabilities are those we create ourselves. In this video, you’ll learn many different ways that misconfigurations can weaken the security of our networks. << Previous Video: Supply Chain Vulnerabilities Next Video: Mobile Device Vulnerabilities >> One very easy way to get your data into the hands of the attacker is

Misconfiguration Vulnerabilities – CompTIA Security+ SY0-701 – 2.3 Read More »

Supply Chain Vulnerabilities video title page

Supply Chain Vulnerabilities – CompTIA Security+ SY0-701 – 2.3

Some attacks come in through the front door. In this video, you’ll learn how the supply chain can be used as an attack vector against our organizations. << Previous Video: Cloud-specific Vulnerabilities Next Video: Misconfiguration Vulnerabilities >> The supply chain involves the process of getting a product from the very beginning raw materials all the

Supply Chain Vulnerabilities – CompTIA Security+ SY0-701 – 2.3 Read More »

Cloud-specific Vulnerabilities video title page

Cloud-specific Vulnerabilities – CompTIA Security+ SY0-701 – 2.3

An application in the cloud is susceptible to many different attack types. In this video, you’ll learn how denial of service, authentication bypass, directory traversal, and other attacks can be used against our cloud-based applications. << Previous Video: Virtualization Vulnerabilities Next Video: Supply Chain Vulnerabilities >> In a relatively short period of time, companies have

Cloud-specific Vulnerabilities – CompTIA Security+ SY0-701 – 2.3 Read More »

Virtualization Vulnerabilities video title page

Virtualization Vulnerabilities – CompTIA Security+ SY0-701 – 2.3

A virtual machine manager can be a useful starting point for an attacker. In this video, you’ll learn how VM escapes and resource reuse can be maliciously used by an attacker. << Previous Video: Hardware Vulnerabilities Next Video: Cloud-specific Vulnerabilities >> With today’s cloud-based infrastructures, we can build virtual machines at a moment’s notice, and

Virtualization Vulnerabilities – CompTIA Security+ SY0-701 – 2.3 Read More »