Learn your way! Get started

220-1101-02: CompTIA A+ Certification: Part 7 of 9: Security Threats

with expert Patrick Loner


Watch trailer


Course at a glance

Included in these subscriptions:

  • Dev & IT Pro Video
  • Dev & IT Pro Power Pack

Release date 5/10/2023
Level Intermediate
Runtime 2h 32m
Closed captioning N/A
Transcript N/A
eBooks / courseware N/A
Hands-on labs N/A
Sample code N/A
Exams Included


Enterprise Solutions

Need reporting, custom learning tracks, or SCORM? Learn More



Course description

In this course for the CompTIA A+ 1101-1102 exam, we will cover how to understand security threats as well as how to secure workstations, mobile devices and networks.

Prerequisites

This course assumes the user has little to experience with computer hardware or software.

Meet the expert

Patrick Loner has certifications for MCSA, MCSE, MCITP, A+, Network+, Security+, and more. He has been working as a Microsoft Certified Trainer, network administrator, and network consultant for over ten years. He has over a decade of experience working with and teaching about Windows networks with client and server operating systems. He has guided many students toward Microsoft and CompTIA certifications. Most recently, he has worked as a freelance trainer and network consultant specializing in Windows Server 2008 and Microsoft Exchange 2007 and Exchange 2010 implementations, design, and upgrades. Patrick continues to branch out now working with and training on Windows Server 2012, Windows 8, Exchange 2013, and System Center Configuration Manager 2012.

Course outline



Module 16

Understanding Threats to Security (27:34)
  • Introduction (00:08)
  • Understanding Threats to Security (01:24)
  • User Threats (02:49)
  • Social Engineering (02:14)
  • Phishing (05:56)
  • Network Threats (04:10)
  • Password Attacks (01:26)
  • Vulnerabilities (03:17)
  • Malicious Code Attacks (00:45)
  • Malware Types (03:45)
  • Physical Threats (01:27)
  • Summary (00:08)
Understanding Common Prevention Methods (58:06)
  • Introduction (00:08)
  • Understanding Common Prevention Methods (00:58)
  • Physical Access Restrictions (02:23)
  • Physical Security (02:30)
  • Anti-Malware (03:26)
  • Demo: Anti-Malware (05:01)
  • Anti Spyware (00:41)
  • Best Practices (01:37)
  • Firewalls (01:12)
  • Hardware Firewalls (01:18)
  • Firewall Functionality (01:18)
  • Proxy Firewalls (00:58)
  • Stateful Packet Inspection (00:53)
  • Host Based Firewalls (01:16)
  • Windows Firewall with Advanced Security (01:52)
  • Demo: Windows Defender (10:44)
  • User Authentication (02:19)
  • Password Best Practices (01:10)
  • Demo: Password Check (03:49)
  • Multifactor Authentication (01:05)
  • Virtual Private Networks (00:45)
  • Data Loss Prevention (01:00)
  • System Hardening (02:05)
  • Trusted Software (02:29)
  • User Education (02:26)
  • Demo: Data Loss Prevention (04:25)
  • Summary (00:08)
Securing Workstations (27:15)
  • Introduction (00:08)
  • Securing Workstations (01:02)
  • Least Privilege (01:40)
  • Password Best Practices (05:07)
  • Account Management (02:53)
  • Disabling Autorun (00:51)
  • Data Encryption (01:31)
  • Demo: Bitlocker and EFS (11:38)
  • Patch Management (02:13)
  • Summary (00:08)

Module 17

Securing Mobile Devices (13:53)
  • Introduction (00:08)
  • Securing Mobile Devices (01:28)
  • Screen Locks (02:16)
  • Finding Mobile Devices (01:32)
  • Backup Mobile Devices (01:15)
  • Login Restrictions (01:07)
  • Antimalware and Updates (00:50)
  • Encryption and Biometrics (01:06)
  • Policies and Procedures (01:57)
  • Best Practices (02:00)
  • Summary (00:08)
Data Destruction and Disposal Methods (09:02)
  • Introduction (00:08)
  • Destruction and Disposal (01:32)
  • Physical Destruction (01:04)
  • Drilling (01:29)
  • Additional Physical Methods (01:01)
  • Recycling or Repurposing (01:50)
  • Repurposing Options (01:46)
  • Summary (00:08)
Security for SOHO and Wireless Networks (16:34)
  • Introduction (00:08)
  • SOHO Networks (01:43)
  • Wireless Security Options (04:51)
  • Device Configuration (00:38)
  • Confiure IP and MAC Filters (01:21)
  • Configure SOHO Firewalls (01:09)
  • Security for SOHO and Wireless (01:40)
  • Demo: Security Configuration on Router (04:52)
  • Summary (00:08)