Moocable is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

Security for CompTIA A+ (220-902)

Description

Any aspiring computer technician must know how to implement security. From physical and logical security concepts to the details of secure protocols, malware protection, and authentication, this course discusses all aspects of computer security. This course covers every objective in the Security domain of the CompTIA A+ 220-902 certification exam. This is the fourth course in a series of six courses to prepare you for the CompTIA A+ 220-902 certification exam. As of January 15, 2019, CompTIA is offering new exams for A+, 220-1001, and 220-1002. Pluralsight covers these in the path "CompTIA A+ (220-1001 and 220-1002)." The 901 and 902 exams are available until July 31, 2019. Topics: Course OverviewPhysical SecurityLogical SecurityWireless Authentication and EncryptionMalware PreventionSocial Engineering, Threats, and VulnerabilitiesPermissions and Encryption in WindowsSecuring Workstations: Best PracticesSecuring Mobile DevicesDecommissioning Storage SecurelySecuring SOHO Networks

Tags

Security for CompTIA A+ (220-902)

Affiliate notice

Any aspiring computer technician must know how to implement security. From physical and logical security concepts to the details of secure protocols, malware protection, and authentication, this course discusses all aspects of computer security. This course covers every objective in the Security domain of the CompTIA A+ 220-902 certification exam. This is the fourth course in a series of six courses to prepare you for the CompTIA A+ 220-902 certification exam. As of January 15, 2019, CompTIA is offering new exams for A+, 220-1001, and 220-1002. Pluralsight covers these in the path "CompTIA A+ (220-1001 and 220-1002)." The 901 and 902 exams are available until July 31, 2019. Topics: Course OverviewPhysical SecurityLogical SecurityWireless Authentication and EncryptionMalware PreventionSocial Engineering, Threats, and VulnerabilitiesPermissions and Encryption in WindowsSecuring Workstations: Best PracticesSecuring Mobile DevicesDecommissioning Storage SecurelySecuring SOHO Networks