Instructor Background

A+ 900 Series Updates

Module 1.1 - Configure and apply BIOS Settings

Module 1.2 - Differentiate Between Motherboards

Module 1.3 - Compare and Contrast RAM

Module 1.4 - Install and Configure Expansion Cards

Module 1.5 - Install and Configure Storage Devices

Module 1.6 - Differentiate CPU Types

Module 1.7 - Compare Connection Interfaces

Module 1.8 - Install Appropriate Power Supply

Module 1.9 - Custom Configurations

Module 1.10 - Evaluate Display Devices

Module 1.11 - Identify Connectors & Cables

Module 1.12 - Install Peripheral Devices

Module 2.1 - Network Cables and Connectors

Module 2.2 - Characteristics or Connectors / Cables

Module 2.3 - TCP/IP

Module 2.4 - Common TCP and UDP

Module 2.5 - Wireless Standards / Encryption

Module 2.6 - Install and Configure a SOHO Router

Module 2.7 - Internet Connection Types / Features

Module 2.8 - Identify Network Types

Module 2.9 - Compare Network Devices

Module 2.10 - Use Appropriate Networking Tools

Module 3.1 - Laptop Hardware and Components

Module 3.2 - Compare Laptop Display Types

Module 3.3 - Compare Laptop Features

Module 4.1 - Printer Imaging Processes

Module 4.2 - Install / Configure Printers

Module 4.3 - Printer Maintenance

Module 5.1 - Appropriate Safety Procedures

Module 5.2 - Environmental Impacts / Controls

Module 5.3 - Communication & Professionalism

Module 5.4 - Dealing with Prohibited Content

Exam Module

Module 1.1 - Windows Operating Systems

Module 1.2 - Installing & Configuring Operating Systems

Module 1.3 - Screen Capture Labs

Module 1.4 - OS Features - Administrative Tools

Module 1.5 - Control Panel

Module 1.6 - Network Connections on Client Desktop

Module 1.7 - Preventative Maintenance Tools

Module 1.8 - OS Security Settings

Module 1.9 - Virtualization

Module 2.1 - Security

Module 2.2 - Security Threats

Module 2.3 - Securing A Work Station Best Practices

Module 2.4 - Data Destruction Methods

Module 2.5 - Securing a Wireless Network

Module 2.6 - Securing Home Office Wired Network

Module 3.1 - Mobile Operating Systems

Module 3.2 - Configuring Network Connectivity and Email on Mobile

Module 3.3 - Securing Mobile Devices

Module 3.4 - Tablets vs Laptops

Module 3.5 - Mobile Device Synchronization

Module 4.1 - Troubleshooting Theory

Module 4.2 - Motherboard, RAM, CPU and Power Issues

Module 4.3 - Troubleshooting Hard Drives and RAID Arrays

Module 4.4 - Troubleshooting Display Issues

Module 4.5 - Troubleshooting Wireless and Wired Connections

Module 4.6 - Troubleshooting Operating System Problems

Module 4.7 - Troubleshooting Security Issues

Module 4.8 - Troubleshooting Laptop Issues

Module 4.9 - Troubleshooting Printers

Exam Module

Social Engineering and Malware

Invite Friends
Facebook Twitter Google+ LinkedIn Email
Description
Virtual Practice Lab
Practice Test
Resources
Social Engineering and Malware

Social Engineering and Malware

Today we examine the different types of security threats that exist and we begin our discussion with Social Engineering, the art of manipulating people to gain information or access.

You’ll learn how people are the most common tool used to exploit a system and or access to information and the many ways in which this easily occurs.  For example, you’ll learn the various ways program, applications, emails and other mediums are configured to deceive or trick people into doing something so that unauthorized access or exposure can be performed. And we’ll discuss strategies and techniques for identifying and minimizing these occurrences from happening.

Watch the Course Intro Video
Learn on the go.
The app designed for the modern cyber security professional.
Get it on Google PlayGet it on the App Store
Practice Labs and Exam Vouchers

Congratulations! You're taking the first step to getting certified. Get some hands on experience with available practice labs OR save some money, support Cybrary, and purchase discounted exam vouchers. Ready to earn your next industry certification? Join cyber security's largest community and start learning today.

JOIN CYBRARY

Upcoming Industry Events

Our Revolution

We believe Cyber Security training should be free, for everyone, FOREVER. Everyone, everywhere, deserves the OPPORTUNITY to learn, begin and grow a career in this fascinating field. Therefore, Cybrary is a free community where people, companies and training come together to give everyone the ability to collaborate in an open source way that is revolutionizing the cyber security educational experience.

Cybrary On The Go

Get the Cybrary app for Android for online and offline viewing of our lessons.

Get it on Google Play
 

Support Cybrary

Donate Here to Get This Month's Donor Badge

 
Skip to toolbar
Cybrary works best if you switch to our Android-friendly app
Continue

We recommend always using caution when following any link

Are you sure you want to continue?

Continue
Cancel