CompTIA Security+ SY0-301: 3.2 – Denial of Service
The bad guys can use many methods to make your web site unavailable. In this video, you’ll learn about denial of service, distributed denial of service, and an overview of the Smurf DoS attack.
The bad guys can use many methods to make your web site unavailable. In this video, you’ll learn about denial of service, distributed denial of service, and an overview of the Smurf DoS attack.
Outages are never a good thing, but these unfortunate incidents must be managed and quantified in relation to their organizational impact. In this video, you’ll learn about calculating uptime and the metrics used when quantifying recovery times.
The fundamentals of security are broadly defined in the areas of confidentiality, integrity, and availability.
If you’re putting together a disaster recovery process, you have a lot of options for your DR site. In this video, you’ll learn the advantages and disadvantages of a cold site, a hot site, and a warm site.
How can you maintain uptime, even when your hardware fails? In this video, you’ll learn about high availability, redundancy and fault tolerance, hard drive RAID technologies, and server clustering.
Backing up your data is one of the most important aspects of your organization’s security policy. In this video, you’ll learn about backup strategies, types of backups, and security concerns associated with onsite and offsite backups.
What are your plans when a disaster strikes? In this video, you’ll learn about disaster recovery planning, contingency methods, and some best-practices for disaster recovery contingency planning.
Today’s generation of botnets have provided the bad guys with lots of money and access to millions of Internet-connected computers.
A logic bomb is not only quite stealthy, but the resulting digital explosion can cause massive damage to your infrastructure.
Rootkits are extremely nasty, especially since they make themselves invisible to the operating system. In this video, you’ll learn about rootkits and how you can find and remove these stealthy pieces of malware.