Free CompTIA Network+ Training

Deauthentication – N10-008 CompTIA Network+ : 4.2

Older 802.11 networks are susceptible to deauthentication attacks. In this video, you’ll learn how deauthentication attacks work and how to prevent them on your wireless network. << Previous Video: Password Attacks Next Video: Social Engineering >> Here’s a scenario you might find yourself in. You’re on a wireless network, working normally, and then all of […]

Deauthentication – N10-008 CompTIA Network+ : 4.2 Read More »

Password Attacks – N10-008 CompTIA Network+ : 4.2

Attackers have many tools for attacking passwords and user credentials. In this video, you’ll learn about password hashes, brute force attacks, and dictionary attacks. << Previous Video: Malware and Ransomware Next Video: Deauthentication >> We use usernames and passwords to authenticate into many different systems. This could be an operating system or an application. But

Password Attacks – N10-008 CompTIA Network+ : 4.2 Read More »

Malware and Ransomware – N10-008 CompTIA Network+ : 4.2

Malware infections can create unexpected downtime and data breaches. In this video, you’ll learn about malware and ransomware. << Previous Video: Rogue Services Next Video: Password Attacks >> Malware is software that’s been installed onto your system that’s designed to be malicious. For example, you might have malware installed that gathers information from the keystrokes

Malware and Ransomware – N10-008 CompTIA Network+ : 4.2 Read More »

VLAN Hopping – N10-008 CompTIA Network+ : 4.2

VLANs are designed to prevent communication between subnets. In this video, you’ll learn how an attacker can use VLAN hopping to circumvent VLAN segmentation. << Previous Video: On-path Attacks Next Video: Spoofing >> If you look at the network configuration on your enterprise network, you’ll notice there are many different VLANs that have been configured.

VLAN Hopping – N10-008 CompTIA Network+ : 4.2 Read More »