Curated Video
CompTIA A+ Certification Core 2 (220-1102) - Social Engineering
Social engineering practices enable attackers to gain access to sensitive information through people. This video highlights social engineering tactics, from tailgating to spear phishing. This clip is from the chapter "Securing Computers"...
Curated Video
CompTIA A+ Certification Core 2 (220-1102) - Anti-Malware
The CompTIA A+ objectives outline a very detailed series of steps for dealing with malware infestation. This video looks at important pre-malware steps and then describes the CompTIA procedures. This clip is from the chapter "Securing...
Curated Video
CompTIA A+ Certification Core 2 (220-1102) - Malware
Malware comes in many forms; infestations have many symptoms. This video describes malware in all its lovely shades of ugly, from viruses and worms to spontaneous application crashes and invalid certificate errors. This clip is from the...
Curated Video
CompTIA A+ Certification Core 2 (220-1102) - Multifactor Authentication (MFA)
Multifactor authentication (MFA) is the process of proving you are who you say you are using unique identifiers that only you have or know. This video explores the different options for MFA, as well as some interesting biometrics such as...
Curated Video
CompTIA A+ Certification Core 2 (220-1102) - Passwords and Authentication
Password security can be compromised by many attack types, such as brute force, dictionary, and rainbow tables. This video explores options for creating very secure passwords and using multifactor authentication. This clip is from the...
Curated Video
CompTIA A+ Certification Core 2 (220-1102) - Physical Security
Secure your assets in three layers: perimeter, rooms, and individual devices. The author explores options for each layer, from security guards at the perimeter to cable locks on individual devices. This clip is from the chapter "Securing...
Curated Video
CompTIA A+ Certification Core 2 (220-1102) - Dealing with Threats
Once you understand threats, you can mitigate those threats by reducing vulnerabilities. This video covers the core tools and actions you must do as a tech to reduce threats. These tools and actions include patching software, running...
Curated Video
CompTIA A+ Certification Core 2 (220-1102) - Threats
You can't protect your networks unless you understand the threats they face. Using the concept of security shells makes it easier to categorize and mitigate threats. This clip is from the chapter "Securing Computers" of the series...
Curated Video
CompTIA A+ Certification Core 2 (220-1102) - Mobile Device Troubleshooting
Mobile devices can encounter problems ranging from unresponsive touchscreens to complete system lockout. This video explores common symptoms, such as slow performance (caused by excessive app running) or overheating, and their solutions....
Curated Video
CompTIA A+ Certification Core 2 (220-1102) - Mobile Device Security
Mobile device security starts with a lock screen but goes beyond multifactor authentication (MFA) and remote find, lock, and wipe. Corporate environments use mobile device management (MDM) services for even more control over mobile...
Curated Video
CompTIA A+ Certification Core 2 (220-1102) - Mobile Devices and E-Mail
Corporate or ISP e-mail setup requires various configuration options, such as POP or IMAP for incoming mail and SMTP for outgoing mail. S/MIME was a way to encrypt e-mail attachments. Standard Google or Apple accounts are set up with a...
Curated Video
CompTIA A+ Certification Core 2 (220-1102) - Maintaining Mobile Devices
Mobile devices are surprisingly self-maintaining these days, but there are a few issues that come up occasionally. A big part of this is understanding the names and functions of certain settings unique to smartphones. This clip is from...
Curated Video
CompTIA A+ Certification Core 2 (220-1102) - Virtual Reality
Virtual reality enables you to experience remote or fanciful locations via computer. Augmented reality layers virtual elements onto a camera feed of the real world, making it easier to follow navigation instructions or chase fanciful...
Curated Video
CompTIA A+ Certification Core 2 (220-1102) - Touring iOS
iOS devices use a lot of gestures for accessing functions. The App Store offers all apps available for iOS. Settings enable you to change application permissions, account information, location services, and more. This clip is from the...
Curated Video
CompTIA A+ Certification Core 2 (220-1102) - Touring Android
Android devices are very customizable. The Google Play store offers shopping options for new applications (apps). Google accounts are mandatory. This video explores features specific to Android devices. This clip is from the chapter...
Curated Video
CompTIA A+ Certification Core 2 (220-1102) - Power Management
Saving power is important, especially on mobile devices and laptops. Every CPU has a built-in feature to shut down different parts of a computer to reduce power needs. It's up to the techs to make sure the power management settings are...
Curated Video
CompTIA A+ Certification Core 2 (220-1102) - Browser Security
With the variety of browsers available to download, it's important to know where the trusted sources are. There are also many other important features to browsers such as extensions and plugins, settings, ad blockers, password managers,...
Curated Video
CompTIA A+ Certification Core 2 (220-1102) - Troubleshooting Internet Connections
The CompTIA A+ exams have many network troubleshooting scenario questions. The author gives you a few rules to help you get through these questions. In addition, a few basic tools and preparation makes troubleshooting most problems easy...
Curated Video
CompTIA A+ Certification Core 2 (220-1102) - Internet of Things (IoT)
Author explores some of the latest and greatest networking technologies with the Internet of Things (IoT). He describes the three common wireless technologies used to connect to IoT devices, 802.11, Zigbee, and Z-wave. The author...
Curated Video
CompTIA A+ Certification Core 2 (220-1102) - Virtual Private Networks (VPNs)
In this video, Author shows how Virtual Private Networks (VPNs) work and why people use VPN connections. He discusses the types of protocols and clients that make this work today and walks through a generic VPN setup. This clip is from...
Curated Video
CompTIA A+ Certification Core 2 (220-1102) - Proxy Servers
In this video, the author describes how proxy servers work to block certain websites and filter outgoing or incoming content. The video shows how to set up a browser to connect to a proxy server. This clip is from the chapter "The...
Curated Video
CompTIA A+ Certification Core 2 (220-1102) - File Transfer Protocol (FTP)
In this video, the author tackles one of the earliest and most common protocols for moving files, File Transfer Protocol (FTP). He explores how FTP works, including passive mode and active mode, and port triggering. This clip is from the...
Curated Video
CompTIA A+ Certification Core 2 (220-1102) - The World Wide Web
The web puts a graphical face on the Internet. You access it via a web browser, connecting with HTTP (insecure) or HTTPS (secure). Certificates give you a resource for whether a website can be trusted. This clip is from the chapter "The...
Curated Video
CompTIA A+ Certification Core 2 (220-1102) - Remote Desktop Connections
The Remote Desktop Protocol (RDP) enables you to connect to a remote Windows system and control it using the graphical user interface. Virtual Network Computing (VNC) enables you to connect to all sorts of computers, including Windows,...