Security Best Practices – CompTIA A+ 220-1102 – 2.6

There are some fundamental security processes that can help keep your Windows OS safe. In this video, you’ll learn about data encryption, password management, managing accounts, and more. << Previous Video: Windows Security Settings Next Video: Mobile Device Security >> One way to keep someone from viewing your data is to encrypt it. And one […]

Security Best Practices – CompTIA A+ 220-1102 – 2.6 Read More »

Windows Security Settings – CompTIA A+ 220-1102 – 2.5

Windows includes a number of different security features to keep your data safe. In this video, you’ll learn about authentication options, NTFS vs. Share permissions, implicit and explicit permissions, and more. << Previous Video: Windows Firewall Next Video: Security Best Practices >> Before you can use most operating systems, you have to log in, and

Windows Security Settings – CompTIA A+ 220-1102 – 2.5 Read More »

Windows Firewall – CompTIA A+ 220-1102 – 2.5

Windows Defender Firewall provides control of both incoming and outgoing data flows. In this video, you’ll learn about the Defender Firewall interface, enable and disable firewall settings, and create custom exceptions for data flows. << Previous Video: Defender Antivirus Next Video: Windows Security Settings >> Windows 10 of Windows 11 includes the Windows Defender Firewall,

Windows Firewall – CompTIA A+ 220-1102 – 2.5 Read More »

Defender Antivirus – CompTIA A+ 220-1102 – 2.5

Microsoft Defender Antivirus is included with Windows by default, and it’s important to know how to manage this service when troubleshooting. In this video, you’ll learn about activating, deactivating, and updating the virus definitions in Microsoft Defender Antivirus. << Previous Video: Security Vulnerabilities Next Video: Windows Firewall >> If you’re running Windows 10 or Windows

Defender Antivirus – CompTIA A+ 220-1102 – 2.5 Read More »

Security Vulnerabilities – CompTIA A+ 220-1102 – 2.4

There are many opportunities that an attacker might use to gain access to a system. In this video, you’ll learn about non-compliant systems, unpatched and unprotected systems, product support lifetimes, and the challenge of securing BYOD systems. << Previous Video: Cross-Site Scripting Next Video: Defender Antivirus >> If you were to look at the logs

Security Vulnerabilities – CompTIA A+ 220-1102 – 2.4 Read More »

Cross-site Scripting – CompTIA A+ 220-1102 – 2.4

A cross-site scripting attack allows an attacker to obtain access to a trusted third-party website. In this video, you’ll learn about cross-site scripting and view a demonstration of a cross-site scripting attack. << Previous Video: SQL Injection Next Video: Security Vulnerabilities >> In this video, we’ll look at ways that cross-site scripting can be used

Cross-site Scripting – CompTIA A+ 220-1102 – 2.4 Read More »

Insider Threats – CompTIA A+ 220-1102 – 2.4

A significant security challenges comes from inside the organization itself. In this video, you’ll learn about insider threats and how insiders are recruited by attackers to provide access to an organization’s private data. << Previous Video: Password Attacks Next Video: SQL Injection >> Insider threats are a remarkably difficult problem to protect against. People inside

Insider Threats – CompTIA A+ 220-1102 – 2.4 Read More »