CompTIA Security+ SY0-501

RFID and NFC Attacks – CompTIA Security+ SY0-501 – 1.2

The unique characteristics of RFID and NFC have created an entirely new set of security challenges. In this video, you’ll learn about RFID and NFC attack types and how to protect yourself against them. << Previous Video: Bluejacking and Bluesnarfing Next: Wireless Disassociation Attacks >> RFID, or radio frequency identification, is now used almost everywhere. […]

RFID and NFC Attacks – CompTIA Security+ SY0-501 – 1.2 Read More »

Bluejacking and Bluesnarfing – CompTIA Security+ SY0-501 – 1.2

Bluetooth is a relatively secure protocol now, but it wasn’t always this way. In this video, you’ll learn about the growing pains of Bluetooth and the attacks that were discovered in its early days. << Previous Video: WPS Attacks Next: RFID and NFC Attacks >> We use Bluetooth on our mobile devices for many types

Bluejacking and Bluesnarfing – CompTIA Security+ SY0-501 – 1.2 Read More »

WPS Attacks – CompTIA Security+ SY0-501 – 1.2

The WPS protocol has suffered from vulnerabilities and active exploits from its introduction. In this video, you’ll learn more about WPS and why security professionals recommend disabling of all WPS functions. << Previous Video: Wireless Jamming Next: Bluejacking and Bluesnarfing >>–> WPS stands for Wi-Fi Protected Setup. it was originally called Wi-Fi Simple Config. 7

WPS Attacks – CompTIA Security+ SY0-501 – 1.2 Read More »

Wireless Jamming – CompTIA Security+ SY0-501 – 1.2

A wireless network is especially susceptible to wireless jamming. In this video, you’ll learn about wireless jamming techniques and how to stop a wireless jamming attack. << Previous Video: Rogue Access Points and Evil Twins Next: WPS Attacks >> – There’s nothing really good that comes from wireless jamming. This is jamming the radio frequencies

Wireless Jamming – CompTIA Security+ SY0-501 – 1.2 Read More »

Rogue Access Points and Evil Twins – CompTIA Security+ SY0-501 – 1.2

A single poorly-placed access point can ruin your day. In this video, you’ll learn about rogue access points and evil twins, and you’ll learn how to prevent rogue access points and mitigate the presence of a potential evil twin. << Previous Video: Wireless Replay Attacks Next: Wireless Jamming >> Imagine if someone could simply connect

Rogue Access Points and Evil Twins – CompTIA Security+ SY0-501 – 1.2 Read More »

Wireless Replay Attacks – CompTIA Security+ SY0-501 – 1.2

A replay attack on a wireless network can be used to take advantage of a vulnerability in wireless protocols. In this video, I’ll demonstrate how a limitation in WEP can be used to speed the identification of the WEP shared password. << Previous Video: Spoofing Next: Rogue Access Points and Evil Twins >> When you’re

Wireless Replay Attacks – CompTIA Security+ SY0-501 – 1.2 Read More »

Driver Manipulation – CompTIA Security+ SY0-501 – 1.2

Our device drivers have direct access to hardware and the operating system. In this video, you’ll learn how attackers can manipulate hardware drivers to gain access to your information. << Previous Video: Client Hijacking Attacks Next: Spoofing >> The traditional anti-virus and anti-malware software that we use on our workstations is very good at identifying

Driver Manipulation – CompTIA Security+ SY0-501 – 1.2 Read More »