How secure are our wireless protocols? In this video, you’ll learn about replay attacks, cracking WEP encryption, WPA2 encryption, and WPS vulnerabilities.
Wireless networks are much more accessible than wired networks, and this accessibility enables a unique set of attacks. In this video, you’ll learn about rogue access points, evil twins, wardriving, warchalking, bluejacking, and bluesnarfing.
A denial of service attack can disrupt communication, crash systems, and create extensive service unavailability. In this video, you’ll learn about denial of service attacks, distributed denial of service attacks, and how amplification is used to deny access to services.
Which of these standards would you commonly associate with LDAP?
What happens if the failed passcode lock attempt security option is activated in Apple iOS?
Which of these port numbers should you enable on your firewall to allow name resolutions to work properly?
A penetration test is an invasive attack of your operating systems and applications. In this video, you’ll learn how a potential vulnerability can be exploited with penetration testing tools.