Common Security Threats – CompTIA A+ 220-902 – 3.1
There are a number of different methods that the bad guys can use to attack your systems. In this video, you’ll learn how to recognize and protect yourself from the most well-known security threats.
There are a number of different methods that the bad guys can use to attack your systems. In this video, you’ll learn how to recognize and protect yourself from the most well-known security threats.
Viruses are well known for corrupting our operating systems and documents. In this video, you’ll learn how viruses work and how worms are able to replicate without human intervention.
Malware is one of the most prevalent forms of malicious software attacks. In this video, you’ll learn about malware types and some of the problems that occur when malware is installed onto our computers.
There are many security threats constantly attacking our computers and our data. In this video, you’ll learn about social engineering, shoulder surfing, malware, rootkits, and much more.
One of the most common attacks come from viruses and malware, and some worms have caused extensive damage in a very short period of time. In this video, you’ll learn about virus and worm attacks and some of the techniques for preventing damage from these attacks.
Viruses and worms have been a significant security challenge on our personal computers for years. In this video, you’ll learn about the differences between computer viruses and worms, and you’ll learn how the Conficker worm manages to spread so easily between systems.
Malware has become a significant issue for Windows-based computers. In this video, you’ll get an overview of malware, learn about the different types of malware, and learn how malware manages to infect our PCs.
The security of the network is a never-ending struggle against the bad guys. In this video, you’ll learn about the most common security threats and what you can do to protect your network resources. We’ll discuss denial of service attacks, viruses, worms, man in the middle attacks, rogue access points, social engineering, and phishing. We’ll also show you how policies and procedures, user training, and patching can help mitigate these security problems in your network.