Other Social Engineering Attacks video title page

Other Social Engineering Attacks – CompTIA Security+ SY0-701 – 2.2

Attackers use many techniques to gain access to our systems. In this video, you’ll learn about misinformation campaigns and brand impersonation. << Previous Video: Watering Hole Attacks Next Video: Memory Injections >> One very effective social engineering technique is to disseminate incorrect information to others. Unlike something that’s a difference of opinion, misinformation and disinformation

Other Social Engineering Attacks – CompTIA Security+ SY0-701 – 2.2 Read More »

Impersonation video title page

Impersonation – CompTIA Security+ SY0-701 – 2.2

Attackers use impersonation to make themselves appear to be someone different. In this video, you’ll learn about some of the most popular impersonation and fraud-based attacks. << Previous Video: Phishing Next Video: Watering Hole Attacks >> Let’s step through a number of different phone calls that have been received by individuals with this particular pretext.

Impersonation – CompTIA Security+ SY0-701 – 2.2 Read More »

Certificates video title page

Certificates – CompTIA Security+ SY0-701 – 1.4

We use certificates to provide trust when accessing other devices or services. In this video, you’ll learn about digital certificates, certificate signing requests, key revocation, OCSP stapling, and more. << Previous Video: Blockchain Technology Next Video: Threat Actors >> A digital certificate is a file that contains both a public key and a digital signature.

Certificates – CompTIA Security+ SY0-701 – 1.4 Read More »