N10-008 Videos

VLAN Hopping – N10-008 CompTIA Network+ : 4.2

VLANs are designed to prevent communication between subnets. In this video, you’ll learn how an attacker can use VLAN hopping to circumvent VLAN segmentation. << Previous Video: On-path Attacks Next Video: Spoofing >> If you look at the network configuration on your enterprise network, you’ll notice there are many different VLANs that have been configured. …

VLAN Hopping – N10-008 CompTIA Network+ : 4.2 Read More »

Risk Management – N10-008 CompTIA Network+ : 4.1

Managing risk is a constant task for any security administrator. In this video, you’ll learn about threat assessments, vulnerability scans, penetration testing, posture assessments, and more. << Previous Video: Authentication Methods Next Video: Denial of Service >> Threats to your network can come from anywhere. And it’s important as a system administrator or security professional …

Risk Management – N10-008 CompTIA Network+ : 4.1 Read More »

Authentication Methods – N10-008 CompTIA Network+ : 4.1

Authentication is at the core of most security implementations. In this video, you’ll learn about local authentication, multi-factor authentication, RADIUS, TACACS, LDAP, Kerberos, and more. << Previous Video: Defense in Depth Next Video: Risk Management >> If you have a wireless router at home, you’ve probably connected to that router to make configuration changes. And …

Authentication Methods – N10-008 CompTIA Network+ : 4.1 Read More »

Defense in Depth – N10-008 CompTIA Network+ : 4.1

A layered defense provides the strongest security. In this video, you’ll learn about network segmentation, screened subnets, separation of duties, network access control, and honeypots. << Previous Video: Security Concepts Next Video: Authentication Methods >> When you’re dealing with information technology, there’s no single security technique that is guaranteed to keep out any type of …

Defense in Depth – N10-008 CompTIA Network+ : 4.1 Read More »

Security Concepts – N10-008 CompTIA Network+ : 4.1

Security is an area of information technology with its own language and concepts. In this video, you’ll learn about vulnerabilities, exploits, least privilege, zero trust, and more. << Previous Video: CIA Triad Next Video: Defense in Depth >>

Availability Concepts – N10-008 CompTIA Network+ : 3.3

A network outage requires a recovery process to get everything running again. In this video, you’ll learn about recovery time objectives, recovery point objectives, mean time to repair, and mean time between failures. << Previous Video: Network Redundancy Next Video: CIA Triad >> We use a number of different metrics when we talk about recovering …

Availability Concepts – N10-008 CompTIA Network+ : 3.3 Read More »