Professor Messer

Rogue Access Points – CompTIA Network+ N10-007 – 4.4

A single rogue access point can cause connectivity issues and could allow private information to become public. In this video, you’ll learn about rogue access points and how to monitor and control their use. << Previous Video: Logic Bombs Next: Wardriving >> Imagine if someone could simply connect to your network without needing any special […]

Rogue Access Points – CompTIA Network+ N10-007 – 4.4 Read More »

Social Engineering – CompTIA Network+ N10-007 – 4.4

Social engineering attacks sneak around your electronic defenses and attack users directly. In this video, you’ll learn about the principles of social engineering attacks. << Previous Video: Denial of Service Next: Insider Threats >> Social engineering is a very low-tech form of a security attack. In fact, it doesn’t involve any technology at all. It

Social Engineering – CompTIA Network+ N10-007 – 4.4 Read More »

Denial of Service – CompTIA Network+ N10-007 – 4.4

Protecting against denial of service attacks is an ongoing security challenge. In this video, you’ll learn about DoS, DDoS, and DDoS amplification attacks. << Previous Video: Wireless Authentication and Security Next: Social Engineering >> A denial of service is when the bad guys are taking a service that’s normally available, and they’re now making it

Denial of Service – CompTIA Network+ N10-007 – 4.4 Read More »

Wireless Authentication and Security – CompTIA Network+ N10-007 – 4.3

To gain access to a wireless network, you’ll need to provide some form of authentication. In this video, you’ll learn about authentication and security technologies for wireless networks. << Previous Video: Wireless Encryption Next: Denial of Service >> In a previous video, we discussed encryption mechanisms that we use on our networks. But we also

Wireless Authentication and Security – CompTIA Network+ N10-007 – 4.3 Read More »

Wireless Encryption – CompTIA Network+ N10-007 – 4.3

We rely on encryption to keep our wireless networks secure. In this video, you’ll learn about encryption technologies used with WPA and WPA2. << Previous Video: Access Control Next: Wireless Authentication and Security >> Many of our networking devices these days are using wireless to communicate, and of course, this wireless communication is going through

Wireless Encryption – CompTIA Network+ N10-007 – 4.3 Read More »

Access Control – CompTIA Network+ N10-007 – 4.2

How to you provide access to your network and services? In this video, you’ll learn about network access control, port security, captive portals, and more. << Previous Video: Multi-factor Authentication Next: Wireless Encryption >> As a network administrator, you’ll probably want to keep people off of the network until they’ve provided the correct authentication. One

Access Control – CompTIA Network+ N10-007 – 4.2 Read More »

Multi-factor Authentication – CompTIA Network+ N10-007 – 4.2

There are many ways to authenticate to a service. In this video, you’ll learn about many common authentication factors. << Previous Video: Authorization, Authentication, and Accounting Next: Access Control >> Most of us are very familiar with logging in to a device and using our username and password. But what if we wanted to provide

Multi-factor Authentication – CompTIA Network+ N10-007 – 4.2 Read More »

Authorization, Authentication, and Accounting – CompTIA Network+ N10-007 – 4.2

If you are managing a large network, then you probably have at least one AAA server. In this video, you’ll learn about authorization, authentication, and accounting services. << Previous Video: Physical Security Next: Multi-factor Authentication >> Being able to log in and gain access to resources is one of the most important parts of anyone’s

Authorization, Authentication, and Accounting – CompTIA Network+ N10-007 – 4.2 Read More »