CompTIA Network+ N10-008

VLAN Hopping – N10-008 CompTIA Network+ : 4.2

VLANs are designed to prevent communication between subnets. In this video, you’ll learn how an attacker can use VLAN hopping to circumvent VLAN segmentation. << Previous Video: On-path Attacks Next Video: Spoofing >> If you look at the network configuration on your enterprise network, you’ll notice there are many different VLANs that have been configured.

VLAN Hopping – N10-008 CompTIA Network+ : 4.2 Read More »

Risk Management – N10-008 CompTIA Network+ : 4.1

Managing risk is a constant task for any security administrator. In this video, you’ll learn about threat assessments, vulnerability scans, penetration testing, posture assessments, and more. << Previous Video: Authentication Methods Next Video: Denial of Service >> Threats to your network can come from anywhere. And it’s important as a system administrator or security professional

Risk Management – N10-008 CompTIA Network+ : 4.1 Read More »

Authentication Methods – N10-008 CompTIA Network+ : 4.1

Authentication is at the core of most security implementations. In this video, you’ll learn about local authentication, multi-factor authentication, RADIUS, TACACS, LDAP, Kerberos, and more. << Previous Video: Defense in Depth Next Video: Risk Management >> If you have a wireless router at home, you’ve probably connected to that router to make configuration changes. And

Authentication Methods – N10-008 CompTIA Network+ : 4.1 Read More »

Defense in Depth – N10-008 CompTIA Network+ : 4.1

A layered defense provides the strongest security. In this video, you’ll learn about network segmentation, screened subnets, separation of duties, network access control, and honeypots. << Previous Video: Security Concepts Next Video: Authentication Methods >> When you’re dealing with information technology, there’s no single security technique that is guaranteed to keep out any type of

Defense in Depth – N10-008 CompTIA Network+ : 4.1 Read More »