Professor Messer

Physical Security – N10-008 CompTIA Network+ : 4.5

There are many physical security tools and techniques that we use to keep our networks safe. In this video, you’ll learn about video surveillance, asset tracking tags, access control hardware, smart lockers, and more. << Previous Video: Remote Access Next Video: Network Troubleshooting Methodology >>

Remote Access – N10-008 CompTIA Network+ : 4.4

We rely on remote access to provide secure network connectivity to external locations. In this video, you’ll learn about VPN types, clientless VPNs, remote desktop connections, remote desktop gateways, and more. << Previous Video: Wireless Security Next Video: Physical Security >>

Social Engineering – N10-008 CompTIA Network+ : 4.2

Attackers often use social engineering to gain access to a physical building or confidential data. In this video, you’ll learn about phishing, tailgating, piggybacking, and shoulder surfing. << Previous Video: Deauthentication Next Video: Network Hardening >>

Deauthentication – N10-008 CompTIA Network+ : 4.2

Older 802.11 networks are susceptible to deauthentication attacks. In this video, you’ll learn how deauthentication attacks work and how to prevent them on your wireless network. << Previous Video: Password Attacks Next Video: Social Engineering >>

Password Attacks – N10-008 CompTIA Network+ : 4.2

Attackers have many tools for attacking passwords and user credentials. In this video, you’ll learn about password hashes, brute force attacks, and dictionary attacks. << Previous Video: Malware and Ransomware Next Video: Deauthentication >>

Rogue Services – N10-008 CompTIA Network+ : 4.2

Keeping rogue devices off the network is an important security policy. In this video, you’ll learn about rogue DHCP servers, rogue access points, and evil twins. << Previous Video: Spoofing Next Video: Malware and Ransomware >>