From the course: CompTIA A+ Core 2 (220-1202) Cert Prep
Unlock this course with a free trial
Join today to access over 25,300 courses taught by industry experts.
Antimalware
From the course: CompTIA A+ Core 2 (220-1202) Cert Prep
Antimalware
- As security policies evolve, so do the tools we use to manage security services. Large organizations might handle security management in-house but many companies are turning to third party security management to detect vulnerabilities, threats, attacks and respond effectively. These services are often delivered through four key technologies, EDR, XDR, MDR and MXDR. Let's take a closer look at each. First off, we have EDR or endpoint detection and response. It is a proactive security approach. It scans and monitors endpoint devices like network servers for potential security threats. EDR uses tools like cyber threat intelligence, machine learning and automation to catch both existing and potential threats that traditional endpoint protections might miss. An EDR solution usually includes incident triage, filtering out false positives so security teams can focus. Threat hunting, actively searching for hidden threats. Data aggregation, gathering the data needed to make informed…
Practice while you learn with exercise files
Download the files the instructor uses to teach the course. Follow along and learn by watching, listening and practicing.
Download courses and learn on the go
Watch courses on your mobile device without an internet connection. Download courses using your iOS or Android LinkedIn Learning app.
Contents
-
-
(Locked)
Common safety procedures5m 34s
-
(Locked)
What is an operating system?9m 4s
-
(Locked)
Users and superusers5m 3s
-
(Locked)
Why Windows?7m 27s
-
Touring Windows 10 and 116m 52s
-
(Locked)
Touring macOS, part 19m 31s
-
(Locked)
Touring macOS, part 27m 11s
-
(Locked)
Touring macOS, part 312m 32s
-
(Locked)
Touring Linux7m 38s
-
(Locked)
-
-
(Locked)
Understanding partitioning3m 56s
-
(Locked)
MBR partitioning11m 42s
-
(Locked)
GPT partitioning8m 16s
-
(Locked)
Understanding file systems11m 14s
-
(Locked)
Popular file systems8m 41s
-
Formatting in action10m 48s
-
(Locked)
Dynamic disks8m 18s
-
(Locked)
New installation: First drive5m 4s
-
(Locked)
Hardware RAID6m 44s
-
(Locked)
Software RAID in storage spaces9m 19s
-
(Locked)
Encrypting mass storage8m 54s
-
(Locked)
Maintaining storage disks6m 15s
-
(Locked)
-
-
(Locked)
Understanding the CLI10m 42s
-
(Locked)
Navigating the CLI13m 23s
-
Working with folders6m 20s
-
(Locked)
Working with files10m 47s
-
(Locked)
Working with drives12m 45s
-
(Locked)
Super copy commands8m 13s
-
(Locked)
Command-line permissions7m 15s
-
(Locked)
Advanced Windows commands7m 34s
-
(Locked)
Advanced Linux commands, part 112m 44s
-
(Locked)
Advanced Linux commands, part 215m 18s
-
(Locked)
Introduction to scripting9m 25s
-
(Locked)
Interpreted languages12m 5s
-
(Locked)
Scripting and the Terminal7m 30s
-
(Locked)
-
-
(Locked)
Working with DNS6m 56s
-
(Locked)
Windows naming5m 54s
-
(Locked)
Working with workgroups7m 18s
-
(Locked)
Working with Active Directory13m 31s
-
(Locked)
Windows sharing with macOS and Linux6m 58s
-
(Locked)
The Net Command4m 7s
-
(Locked)
Routers12m
-
(Locked)
Basic router configuration11m 42s
-
Firewall configuration10m 31s
-
(Locked)
Windows Firewall7m 37s
-
(Locked)
Port forwarding7m 5s
-
(Locked)
Advanced router configuration7m 44s
-
(Locked)
Virtual local area networks (VLANs)7m 48s
-
(Locked)
-
-
(Locked)
Telnet and SSH6m 39s
-
(Locked)
Remote desktop connections5m
-
(Locked)
The World Wide Web8m 47s
-
(Locked)
File Transfer Protocol (FTP)6m 49s
-
(Locked)
Proxy servers7m 27s
-
(Locked)
Virtual private networks (VPNs)7m 41s
-
(Locked)
Internet of Things (IoT)3m 28s
-
Troubleshooting internet connections6m 39s
-
(Locked)
Browser security6m 49s
-
(Locked)