RSSCompTIA Network+ N10-007

Device Hardening – CompTIA Network+ N10-007 – 4.5

Device Hardening – CompTIA Network+ N10-007 – 4.5

| May 1, 2018

There are many different ways to harden devices from security exploits. In this video, you’ll learn about upgrading firmware, patch management, file hashing, and much more. << Previous Video: Vulnerabilities and Exploits Next: Mitigation Techniques >> As a network administrator, you'll be connecting switches, routers, firewalls, and many other devices to the network. In this…

Continue Reading

Vulnerabilities and Exploits – CompTIA Network+ N10-007 – 4.4

Vulnerabilities and Exploits – CompTIA Network+ N10-007 – 4.4

| April 30, 2018

In network security, we use specific terms to help describe security status and events. In this video, you’ll learn the differences between a vulnerability and an exploit. << Previous Video: Man-in-the-Middle Next: Device Hardening >> The term "vulnerability" and the term "exploit" are sometimes incorrectly used interchangeably. In this video, we'll look at the differences…

Continue Reading

Man-in-the-Middle – CompTIA Network+ N10-007 – 4.4

Man-in-the-Middle – CompTIA Network+ N10-007 – 4.4

| April 30, 2018

A man-in-the-middle attack can allow an attacker to view all of the network information sent and received by your workstation. In this video, you’ll learn about man-in-the-middle attacks, ARP poisoning, and man-in-the-browser attacks. << Previous Video: VLAN Hopping Next: Vulnerabilities and Exploits >> We usually consider our network communication to be private. We're communicating to…

Continue Reading

VLAN Hopping – CompTIA Network+ N10-007 – 4.4

VLAN Hopping – CompTIA Network+ N10-007 – 4.4

| April 30, 2018

VLAN hopping allows an attacker to send frames to a device on a different VLAN. In this video, you’ll learn how switch spoofing and double tagging can be used when vlan hopping. << Previous Video: Brute Force Attacks Next: Man-in-the-Middle >> Many organizations use VLANs to separate the network into different parts. This may be…

Continue Reading

Brute Force Attacks – CompTIA Network+ N10-007 – 4.4

Brute Force Attacks – CompTIA Network+ N10-007 – 4.4

| April 30, 2018

If an attacker doesn’t know your password, they can try every possible combination in a brute force attack. In this video, you’ll learn about brute force and dictionary attacks. << Previous Video: Wireless Deauthentication Next: VLAN Hopping >> If you are trying to reverse engineer someone's password, one of the best ways to do this…

Continue Reading

Wireless Deauthentication – CompTIA Network+ N10-007 – 4.4

Wireless Deauthentication – CompTIA Network+ N10-007 – 4.4

| April 30, 2018

Wireless deauthentication or wireless disassociation can be used as a denial of service attack on wireless network devices. In this video, you’ll learn about wireless deauthentication, and I’ll demonstrate a deauthentication attack on my wireless network. << Previous Video: Spoofing Next: Brute Force Attacks >> A wireless disassociation attack is a bad one. You're wandering…

Continue Reading

Spoofing – CompTIA Network+ N10-007 – 4.4

Spoofing – CompTIA Network+ N10-007 – 4.4

| April 30, 2018

A spoofed device can be used to circumvent a number of security controls. In this video, you’ll learn about ARP poisoning, MAC spoofing and IP spoofing. << Previous Video: DNS Poisoning Next: Wireless Deauthentication >> Spoofing is a technique used extensively in attacks. It is when one device pretends to be something it's not. And…

Continue Reading

DNS Poisoning – CompTIA Network+ N10-007 – 4.4

DNS Poisoning – CompTIA Network+ N10-007 – 4.4

| April 30, 2018

DNS poisoning can be an effective way to attack many devices at one time. In this video, you’ll learn how a DNS poisoning attacks can be implemented. << Previous Video: Ransomware Next: Spoofing >> The domain name services are a critical part of our IP networking. These are obviously the servers that are taking the…

Continue Reading

Ransomware – CompTIA Network+ N10-007 – 4.4

Ransomware – CompTIA Network+ N10-007 – 4.4

| April 30, 2018

Ransomware can lock you out of your own documents and files in an instant. In this video, you’ll learn about how ransomware works and how you can protect yourself from a ransomware attack. << Previous Video: Phishing Next: DNS Poisoning >> The most valuable asset associated with your computers, whether they're computers at home or…

Continue Reading

Phishing – CompTIA Network+ N10-007 – 4.4

Phishing – CompTIA Network+ N10-007 – 4.4

| April 30, 2018

The bad guys have found that the best place to obtain a user’s login credentials is directly from the user. In this video, you’ll learn about phishing and spear phishing techniques that have been used to obtain login information. << Previous Video: Wardriving Next: Ransomware >> Phishing is a technique used by the bad guys…

Continue Reading

X
My Network+ Study Group is live right now! Click here to join us
My free Live Network+ Study Group is Wednesday. Click here to register!