5910 Breckenridge Pkwy Suite B, Tampa, FL. 33610
(800) 272-0707

SkillSoft Explore Course

IT Professional Curricula     Operating Systems and Server Technologies Solution Area     CompTIA A+     CompTIA A+ (220-1102)
Malware is software designed with malicious intent that often aims to disrupt, enable unauthorized access, or cause end-user access interference. In this course, you'll learn how to detect, remove, and prevent malware using the appropriate tools and methods.
Begin by exploring the various types of malware including trojans, rootkits, viruses, spyware, ransomware, keyloggers, boot sector viruses, and cryptominers. Become familiar with the recovery console and recognize when to perform an operating system reinstallation as a result of malware. Next, learn how to differentiate between anti-virus and anti-malware solutions and discover how software firewalls can help secure a device. Lastly, discover the importance of end-user training and education as it relates to malware and other cyber threats. ​
After completing this course you'll know how to detect, remove, and prevent malware using the appropriate tools and methods. This course is part of a series used to prepare for the CompTIA A+ Core 2 (220-1102) certification exam.

Objectives

CompTIA A+ (220-1102): Malware Detection, Removal, & Prevention

  • discover the key concepts covered in this course
  • outline what trojan malware is and how it can mislead users regarding its true intent
  • recognize how rootkits can enable hackers to gain access to a target device
  • outline what computer viruses are and how they are designed to spread
  • differentiate between types of spyware including adware, system monitors, tracking, including web tracking, and trojans
  • outline what ransomware is and how it can encrypt files on a computer
  • recognize how keyloggers can record keystrokes made by a computer user and how they can be used to gain unauthorized access
  • recognize how boot sector viruses attack a master boot record or system boot partition
  • recognize how cryptominers aim to hijack a device's processing power and use it to mine cryptocurrency
  • outline what the recovery console is and when to perform an operating system reinstallation as a result of malware
  • differentiate between anti-virus and anti-malware solutions
  • outline what software firewalls are and how they can help secure a device
  • recognize the importance of end user training and education as it relates to malware and other cyber threats
  • summarize the key concepts covered in this course