CompTIA A+ Core 2: Malware Detection, Removal, & Prevention

CompTIA    |    Beginner
  • 14 videos | 1h 41m 48s
  • Includes Assessment
  • Earns a Badge
Rating 4.5 of 48 users Rating 4.5 of 48 users (48)
Malware is software designed with malicious intent that often aims to disrupt, enable unauthorized access, or cause end-user access interference. In this course, you'll learn how to detect, remove, and prevent malware using the appropriate tools and methods. Begin by exploring the various types of malware including trojans, rootkits, viruses, spyware, ransomware, keyloggers, boot sector viruses, and cryptominers. Become familiar with the recovery console and recognize when to perform an operating system reinstallation as a result of malware. Next, learn how to differentiate between anti-virus and anti-malware solutions and discover how software firewalls can help secure a device. Lastly, discover the importance of end-user training and education as it relates to malware and other cyber threats. ​ After completing this course you'll know how to detect, remove, and prevent malware using the appropriate tools and methods. This course is part of a series used to prepare for the CompTIA A+ Core 2 (220-1102) certification exam.

WHAT YOU WILL LEARN

  • Discover the key concepts covered in this course
    Outline what trojan malware is and how it can mislead users regarding its true intent
    Recognize how rootkits can enable hackers to gain access to a target device
    Outline what computer viruses are and how they are designed to spread
    Differentiate between types of spyware including adware, system monitors, tracking, including web tracking, and trojans
    Outline what ransomware is and how it can encrypt files on a computer
    Recognize how keyloggers can record keystrokes made by a computer user and how they can be used to gain unauthorized access
  • Recognize how boot sector viruses attack a master boot record or system boot partition
    Recognize how cryptominers aim to hijack a device's processing power and use it to mine cryptocurrency
    Outline what the recovery console is and when to perform an operating system reinstallation as a result of malware
    Differentiate between anti-virus and anti-malware solutions
    Outline what software firewalls are and how they can help secure a device
    Recognize the importance of end user training and education as it relates to malware and other cyber threats
    Summarize the key concepts covered in this course

IN THIS COURSE

  • 1m 53s
  • 10m 1s
    In this video, you will outline what trojan malware is and how it can mislead users about its true intent. FREE ACCESS
  • Locked
    3.  Rootkit Detection
    12m 33s
    After completing this video, you will be able to recognize how rootkits can enable hackers to gain access to a target device. FREE ACCESS
  • Locked
    4.  Virus Prevention
    11m 9s
    In this video, you will outline what computer viruses are and how they spread. FREE ACCESS
  • Locked
    5.  Types of Spyware
    8m 23s
    Find out how to differentiate between types of spyware including adware, system monitors, tracking, web tracking, and trojans. FREE ACCESS
  • Locked
    6.  Ransomware Threats
    9m 41s
    In this video, you will outline what ransomware is and how it can encrypt files on a computer. FREE ACCESS
  • Locked
    7.  Keylogger Programs
    6m 21s
    After completing this video, you will be able to recognize how keyloggers can record keystrokes made by a computer user and how they can be used to gain unauthorized access. FREE ACCESS
  • Locked
    8.  Boot Sector Viruses
    5m 12s
    After completing this video, you will be able to recognize how boot sector viruses attack a master boot record or system boot partition. FREE ACCESS
  • Locked
    9.  Cryptomining Malware
    6m 7s
    Upon completion of this video, you will be able to recognize how cryptominers aim to hijack a device's processing power and use it to mine cryptocurrency. FREE ACCESS
  • Locked
    10.  Recovery Console & Operating System Reinstallations
    9m 2s
    During this video, you will learn how to outline what the recovery console is and when to perform an operating system reinstallation as a result of malware. FREE ACCESS
  • Locked
    11.  Anti-virus and Anti-malware
    5m 6s
    Find out how to differentiate between anti-virus and anti-malware solutions. FREE ACCESS
  • Locked
    12.  Software Firewalls
    6m 58s
    In this video, you will outline what software firewalls are and how they can help secure a device. FREE ACCESS
  • Locked
    13.  Training and Education
    8m 15s
    Upon completion of this video, you will be able to recognize the importance of end user training and education as it relates to malware and other cyber threats. FREE ACCESS
  • Locked
    14.  Course Summary
    1m 7s
    ff15ed4f-aee3-46b2-b28a-e11d5c52e1ae FREE ACCESS

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Rating 4.6 of 80 users Rating 4.6 of 80 users (80)
Rating 4.4 of 200 users Rating 4.4 of 200 users (200)
Rating 4.6 of 179 users Rating 4.6 of 179 users (179)

PEOPLE WHO VIEWED THIS ALSO VIEWED THESE

Rating 4.5 of 424 users Rating 4.5 of 424 users (424)
Rating 4.5 of 79 users Rating 4.5 of 79 users (79)
Rating 4.5 of 198 users Rating 4.5 of 198 users (198)