CompTIA A+ Core 2: Malware Detection, Removal, & Prevention
CompTIA A+
| Beginner
- 14 videos | 1h 41m 48s
- Includes Assessment
- Earns a Badge
Malware is software designed with malicious intent that often aims to disrupt, enable unauthorized access, or cause end-user access interference. In this course, you'll learn how to detect, remove, and prevent malware using the appropriate tools and methods. Begin by exploring the various types of malware including trojans, rootkits, viruses, spyware, ransomware, keyloggers, boot sector viruses, and cryptominers. Become familiar with the recovery console and recognize when to perform an operating system reinstallation as a result of malware. Next, learn how to differentiate between anti-virus and anti-malware solutions and discover how software firewalls can help secure a device. Lastly, discover the importance of end-user training and education as it relates to malware and other cyber threats. After completing this course you'll know how to detect, remove, and prevent malware using the appropriate tools and methods. This course is part of a series used to prepare for the CompTIA A+ Core 2 (220-1102) certification exam.
WHAT YOU WILL LEARN
-
discover the key concepts covered in this courseoutline what trojan malware is and how it can mislead users regarding its true intentrecognize how rootkits can enable hackers to gain access to a target deviceoutline what computer viruses are and how they are designed to spreaddifferentiate between types of spyware including adware, system monitors, tracking, including web tracking, and trojansoutline what ransomware is and how it can encrypt files on a computerrecognize how keyloggers can record keystrokes made by a computer user and how they can be used to gain unauthorized access
-
recognize how boot sector viruses attack a master boot record or system boot partitionrecognize how cryptominers aim to hijack a device's processing power and use it to mine cryptocurrencyoutline what the recovery console is and when to perform an operating system reinstallation as a result of malwaredifferentiate between anti-virus and anti-malware solutionsoutline what software firewalls are and how they can help secure a devicerecognize the importance of end user training and education as it relates to malware and other cyber threatssummarize the key concepts covered in this course
IN THIS COURSE
-
1.Course Overview1m 53sUP NEXT
-
2.Trojan Malware Threats10m 1s
-
3.Rootkit Detection12m 33s
-
4.Virus Prevention11m 9s
-
5.Types of Spyware8m 23s
-
6.Ransomware Threats9m 41s
-
7.Keylogger Programs6m 21s
-
8.Boot Sector Viruses5m 12s
-
9.Cryptomining Malware6m 7s
-
10.Recovery Console & Operating System Reinstallations9m 2s
-
11.Anti-virus and Anti-malware5m 6s
-
12.Software Firewalls6m 58s
-
13.Training and Education8m 15s
-
14.Course Summary1m 7s
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.
Digital badges are yours to keep, forever.