CompTIA Security+ SY0-701

Physical Attacks video title page

Physical Attacks – CompTIA Security+ SY0-701 – 2.4

Some attacks take advantage of vulnerabilities in our physical world. In this video, you’ll learn about brute force attacks, RFID cloning, and environmental attacks. << Previous Video: Other Malware Types Next Video: Denial of Service >> In this course, we’ve talked a lot about technology and how attackers can circumvent different aspects of our operating […]

Physical Attacks – CompTIA Security+ SY0-701 – 2.4 Read More »

An Overview of Malware video title page

An Overview of Malware – CompTIA Security+ SY0-701 – 2.4

Malware is a significant security concern on our modern networks. In this video, you’ll learn how malware and ransomware is used in cybersecurity attacks. << Previous Video: Zero-day Vulnerabilities Next Video: Viruses and Worms >> Malware is a very broad term. But it effectively describes any type of software that is doing bad things to

An Overview of Malware – CompTIA Security+ SY0-701 – 2.4 Read More »

Zero-day Vulnerabilities video title page

Zero-day Vulnerabilities – CompTIA Security+ SY0-701 – 2.3

An attack can sometimes take us by surprise. In this video, you’ll learn about zero-day attacks and how to prepare and respond to these attacks. << Previous Video: Mobile Device Vulnerabilities Next Video: An Overview of Malware >> The applications and operating systems that you’re using right now most likely have security vulnerabilities inside of

Zero-day Vulnerabilities – CompTIA Security+ SY0-701 – 2.3 Read More »

Mobile Device Vulnerabilities video title page

Mobile Device Vulnerabilities – CompTIA Security+ SY0-701 – 2.3

Our mobile devices can be used by attackers to gain access to our networks and data. In this video, you’ll learn about jailbreaking, rooting, and sideloading. << Previous Video: Misconfiguration Vulnerabilities Next Video: Zero-day Vulnerabilities >> To say that our mobile devices are challenging to secure is probably an understatement. These are devices that often

Mobile Device Vulnerabilities – CompTIA Security+ SY0-701 – 2.3 Read More »

Misconfiguration Vulnerabilities video title page

Misconfiguration Vulnerabilities – CompTIA Security+ SY0-701 – 2.3

Some of the most common vulnerabilities are those we create ourselves. In this video, you’ll learn many different ways that misconfigurations can weaken the security of our networks. << Previous Video: Supply Chain Vulnerabilities Next Video: Mobile Device Vulnerabilities >> One very easy way to get your data into the hands of the attacker is

Misconfiguration Vulnerabilities – CompTIA Security+ SY0-701 – 2.3 Read More »

Supply Chain Vulnerabilities video title page

Supply Chain Vulnerabilities – CompTIA Security+ SY0-701 – 2.3

Some attacks come in through the front door. In this video, you’ll learn how the supply chain can be used as an attack vector against our organizations. << Previous Video: Cloud-specific Vulnerabilities Next Video: Misconfiguration Vulnerabilities >> The supply chain involves the process of getting a product from the very beginning raw materials all the

Supply Chain Vulnerabilities – CompTIA Security+ SY0-701 – 2.3 Read More »

Cloud-specific Vulnerabilities video title page

Cloud-specific Vulnerabilities – CompTIA Security+ SY0-701 – 2.3

An application in the cloud is susceptible to many different attack types. In this video, you’ll learn how denial of service, authentication bypass, directory traversal, and other attacks can be used against our cloud-based applications. << Previous Video: Virtualization Vulnerabilities Next Video: Supply Chain Vulnerabilities >> In a relatively short period of time, companies have

Cloud-specific Vulnerabilities – CompTIA Security+ SY0-701 – 2.3 Read More »