Today’s 220-1201 CompTIA A+ Pop Quiz: I’ll need to charge soon
Today’s 220-1201 CompTIA A+ Pop Quiz: I’ll need to charge soon Read More »
Protecting against vulnerabilities is a constant challenge. In this video, you’ll learn about standard operating environments (SOE), unpatched systems, end of service life (EOSL), and more. << Previous: Supply Chain Attacks Next Video: Removing Malware >>
Security Vulnerabilities – CompTIA A+ 220-1202 – 2.5 Read More »
A supply chain attack takes advantage of the trust we have for our vendors and partners. In this video, you’ll learn about identifying and preventing supply chain attacks from our service providers, hardware providers, and software providers. << Previous: Business Email Compromise Next Video: Security Vulnerabilities >>
Supply Chain Attacks – CompTIA A+ 220-1202 – 2.5 Read More »
A business email compromise is a challenging social engineering attack to protect against. In this video, you’ll learn how a BEC attack can be carried out and how to prevent a compromise from occurring. << Previous: Cross-site Scripting Next Video: Supply Chain Attacks >>
Business Email Compromise – CompTIA A+ 220-1202 – 2.5 Read More »
A cross-site scripting attack takes advantage of the trust associated with our browser. In this video, you’ll learn how a cross-site scripting attack can be carried out and you’ll see a live demonstration of an XSS attack against a vulnerable application. << Previous: SQL Injection Attacks Next Video: Business Email Compromise >>
Cross-site Scripting – CompTIA A+ 220-1202 – 2.5 Read More »
A SQL injection can provide an attacker with access to everything in your database. In this video, you’ll learn how a SQL injection is constructed and you’ll see a live demonstration of a SQL injection on a vulnerable application. << Previous: Insider Threats Next Video: Cross-site Scripting >>
SQL Injection Attacks – CompTIA A+ 220-1202 – 2.5 Read More »
Internal employees and contractors can be a significant threat to an organization’s security. In this video, you’ll learn how attackers take advantage of insider threats and ways to protect against this attack type. << Previous: Password Attacks Next Video: SQL Injection Attacks >>
Our passwords are often the only protection our applications have from an attacker. In this video, you’ll learn about password hashing, brute force attacks, and dictionary attacks. << Previous: Zero-day Attacks Next Video: Insider Threats >>
A zero-day attack takes advantage of a previously-unknown vulnerability. In this video, you’ll learn about zero-day attacks and how organizations can react to a zero-day vulnerability. << Previous: On-Path Attacks Next Video: Password Attacks >>