CompTIA A+ Core 2: Malware Detection, Removal, & Prevention
CompTIA
| Beginner
- 14 videos | 1h 41m 48s
- Includes Assessment
- Earns a Badge
Malware is software designed with malicious intent that often aims to disrupt, enable unauthorized access, or cause end-user access interference. In this course, you'll learn how to detect, remove, and prevent malware using the appropriate tools and methods. Begin by exploring the various types of malware including trojans, rootkits, viruses, spyware, ransomware, keyloggers, boot sector viruses, and cryptominers. Become familiar with the recovery console and recognize when to perform an operating system reinstallation as a result of malware. Next, learn how to differentiate between anti-virus and anti-malware solutions and discover how software firewalls can help secure a device. Lastly, discover the importance of end-user training and education as it relates to malware and other cyber threats. After completing this course you'll know how to detect, remove, and prevent malware using the appropriate tools and methods. This course is part of a series used to prepare for the CompTIA A+ Core 2 (220-1102) certification exam.
WHAT YOU WILL LEARN
-
Discover the key concepts covered in this courseOutline what trojan malware is and how it can mislead users regarding its true intentRecognize how rootkits can enable hackers to gain access to a target deviceOutline what computer viruses are and how they are designed to spreadDifferentiate between types of spyware including adware, system monitors, tracking, including web tracking, and trojansOutline what ransomware is and how it can encrypt files on a computerRecognize how keyloggers can record keystrokes made by a computer user and how they can be used to gain unauthorized access
-
Recognize how boot sector viruses attack a master boot record or system boot partitionRecognize how cryptominers aim to hijack a device's processing power and use it to mine cryptocurrencyOutline what the recovery console is and when to perform an operating system reinstallation as a result of malwareDifferentiate between anti-virus and anti-malware solutionsOutline what software firewalls are and how they can help secure a deviceRecognize the importance of end user training and education as it relates to malware and other cyber threatsSummarize the key concepts covered in this course
IN THIS COURSE
-
1m 53s
-
10m 1sIn this video, you will outline what trojan malware is and how it can mislead users about its true intent. FREE ACCESS
-
12m 33sAfter completing this video, you will be able to recognize how rootkits can enable hackers to gain access to a target device. FREE ACCESS
-
11m 9sIn this video, you will outline what computer viruses are and how they spread. FREE ACCESS
-
8m 23sFind out how to differentiate between types of spyware including adware, system monitors, tracking, web tracking, and trojans. FREE ACCESS
-
9m 41sIn this video, you will outline what ransomware is and how it can encrypt files on a computer. FREE ACCESS
-
6m 21sAfter completing this video, you will be able to recognize how keyloggers can record keystrokes made by a computer user and how they can be used to gain unauthorized access. FREE ACCESS
-
5m 12sAfter completing this video, you will be able to recognize how boot sector viruses attack a master boot record or system boot partition. FREE ACCESS
-
6m 7sUpon completion of this video, you will be able to recognize how cryptominers aim to hijack a device's processing power and use it to mine cryptocurrency. FREE ACCESS
-
9m 2sDuring this video, you will learn how to outline what the recovery console is and when to perform an operating system reinstallation as a result of malware. FREE ACCESS
-
5m 6sFind out how to differentiate between anti-virus and anti-malware solutions. FREE ACCESS
-
6m 58sIn this video, you will outline what software firewalls are and how they can help secure a device. FREE ACCESS
-
8m 15sUpon completion of this video, you will be able to recognize the importance of end user training and education as it relates to malware and other cyber threats. FREE ACCESS
-
1m 7sff15ed4f-aee3-46b2-b28a-e11d5c52e1ae FREE ACCESS
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.
Digital badges are yours to keep, forever.