Today’s 220-1202 CompTIA A+ Pop Quiz: It’s difficult to pronounce
Today’s 220-1202 CompTIA A+ Pop Quiz: It’s difficult to pronounce Read More »
A browser is one of the most important application environments. In this video, you’ll learn about hash verification, browser patching, secure extensions, password managers, and more. << Previous: Securing a SOHO Network Next Video: Troubleshooting Windows >>
The security concerns of a SOHO (small office home office) network are very similar to those of a large corporate network. In this video, you’ll learn about default passwords, IP filtering, firmware updates, content filtering, and much more. << Previous: Data Destruction Next Video: Browser Security >>
Securing a SOHO Network – CompTIA A+ 220-1202 – 2.10 Read More »
There may be circumstances where the destruction of a storage device is the best way to keep the data safe. In this video, you’ll learn about physical destruction options, formatting best practices, and the importance of a certificate of destruction. << Previous: Mobile Device Security Next Video: Securing a SOHO Network >>
Mobile device security includes a number of best practices specific to these unique platforms. In this video, you’ll learn about full device encryption, screen locks, configuration profiles, remote wipe, and more. << Previous: Security Best Practices Next Video: Data Destruction >>
Mobile Device Security – CompTIA A+ 220-1202 – 2.8 Read More »
It’s important to always follow best practices when securing a network. In this video, you’ll learn about data encryption options, password complexity, account disabling, locking the desktop, and much more. << Previous: Removing Malware Next Video: Mobile Device Security >>
Security Best Practices – CompTIA A+ 220-1202 – 2.7 Read More »
There are times when removing malware may be the best option available. In this video, you’ll learn about identifying malware, quarantining systems, remediating the malware, and other malware removal options. << Previous: Security Vulnerabilities Next Video: Security Best Practices >>