Learn your way! Get started

1001-02: CompTIA A+ Certification, Part 12 of 13: Network Security

with expert Patrick Loner


Watch trailer


Course at a glance

Included in these subscriptions:

  • Dev & IT Pro Video
  • Dev & IT Pro Power Pack

Release date 2/28/2021
Level Intermediate
Runtime 1h 18m
Closed captioning N/A
Transcript N/A
eBooks / courseware N/A
Hands-on labs N/A
Sample code N/A
Exams Included


Enterprise Solutions

Need reporting, custom learning tracks, or SCORM? Learn More



Course description

In this course for the CompTIA A+ 1001-1002 exam, we'll take a look at Viruses, Trojans, worms, and distributed denial of service attacks which are some of the most significant threats in networking. Next, we'll explore these and other threats and vulnerabilities, including the basic security of file and folder permissions. Finally, we'll learn the basics of user authentication and extended security through the use of encryption such as EFS and bit locker.

Prerequisites

The course assumes that a student has a basic familiarity with computer operation.

Learning Paths

This course will help you prepare for the following certification and exam:
CompTIA A+ Certification

Meet the expert

Patrick Loner has certifications for MCSA, MCSE, MCITP, A+, Network+, Security+, and more. He has been working as a Microsoft Certified Trainer, network administrator, and network consultant for over ten years. He has over a decade of experience working with and teaching about Windows networks with client and server operating systems. He has guided many students toward Microsoft and CompTIA certifications. Most recently, he has worked as a freelance trainer and network consultant specializing in Windows Server 2008 and Microsoft Exchange 2007 and Exchange 2010 implementations, design, and upgrades. Patrick continues to branch out now working with and training on Windows Server 2012, Windows 8, Exchange 2013, and System Center Configuration Manager 2012.

Course outline



Network Security

Security Threats, Vulnerabilities, and Prevention (31:27)
  • Introduction (00:39)
  • Security Threats, Vulnerabilities, and Prevention (00:25)
  • Threats (09:11)
  • Network Threats (01:44)
  • Zero-Day Attacks and Zombies (01:16)
  • Password Attacks (01:40)
  • Noncompliant Systems (00:50)
  • Malicious Code Attacks (01:32)
  • Types of Malicious Code (03:44)
  • Physical Access Restrictions (01:26)
  • Physical Prevention Mechanisms (01:29)
  • Virtual Private Networks (00:58)
  • Data Loss Prevention (02:26)
  • System Hardening (01:42)
  • Smart Cards (01:10)
  • Summary (01:08)
Configure Basic Windows Security Settings (37:29)
  • Introduction (01:04)
  • Configuring Basic Windows Security Settings (01:45)
  • Authentication Process (05:48)
  • Credentials (04:35)
  • Permissions (05:40)
  • Permissions Rules (03:46)
  • Encrypting File System (05:03)
  • Encrypting Process (01:56)
  • BitLocker (04:37)
  • User Account Control (02:33)
  • Summary (00:36)
Troubleshooting OS Security (09:28)
  • Introduction (00:48)
  • Troubleshooting OS Security Issues (00:48)
  • Common Symptoms (04:47)
  • Troubleshooting Tools (02:31)
  • Summary (00:32)