CompTIA Security+ SY0-501

Zero-Day Attacks – CompTIA Security+ SY0-501 – 1.2

There are unknown vulnerabilities in our operating systems and applications, and it’s a race to see who can exploit them first. In this video, you’ll learn about zero-day attacks and what you can do to prevent an unforeseen attack. << Previous Video: DNS Poisoning and Domain Hijacking Next: Replay Attacks >> The operating systems and […]

Zero-Day Attacks – CompTIA Security+ SY0-501 – 1.2 Read More »

DNS Poisoning and Domain Hijacking – CompTIA Security+ SY0-501 – 1.2

If you can’t hack the user, maybe you can hack the DNS server. In this video, you’ll learn how a DNS poisoning attack or domain hijacking can allow an attacker to seamlessly impersonate an entire company. << Previous Video: Privilege Escalation Next: Zero-Day Attacks >> The domain name services are a critical part of our

DNS Poisoning and Domain Hijacking – CompTIA Security+ SY0-501 – 1.2 Read More »

Privilege Escalation – CompTIA Security+ SY0-501 – 1.2

The fastest way to become the system administrator is to steal it. In this video, you’ll learn how privilege escalation can instantly take you from zero to user 0. << Previous Video: Cross-site Request Forgery Next: DNS Poisoning and Domain Hijacking >> Privilege escalation is the type of vulnerability you really don’t want to have

Privilege Escalation – CompTIA Security+ SY0-501 – 1.2 Read More »

Cross-site Request Forgery – CompTIA Security+ SY0-501 – 1.2

Session riding can be one of the more challenging attack types to guard against. In this video, you’ll learn how XSRF works and how the bad guys can manipulate a vulnerable application for their own gain. << Previous Video: Cross-site Scripting Next: Privilege Escalation >> The cross-site request forgery attack is sometimes called a one-click

Cross-site Request Forgery – CompTIA Security+ SY0-501 – 1.2 Read More »

Cross-site Scripting – XSS – CompTIA Security+ SY0-501 – 1.2

If you can convince a browser to run a script, then you can control a significant amount of a user’s working environment. In this video, you’ll learn about cross-site scripting and how XSS attacks can be used to steal right from under our noses. << Previous Video: Data Injection Next: Cross-site Request Forgery >> Cross-site

Cross-site Scripting – XSS – CompTIA Security+ SY0-501 – 1.2 Read More »

Buffer Overflows – CompTIA Security+ SY0-501 – 1.2

A badly written application can open the door to mischief. In this video, you’ll learn how a single buffer overflow can disrupt the security of an operating system. << Previous Video: Man-in-the-Middle Next: Data Injection >> As you’re probably aware, the applications that we’re using store everything that they need in the memory of your

Buffer Overflows – CompTIA Security+ SY0-501 – 1.2 Read More »

Man-in-the-Middle – CompTIA Security+ SY0-501 – 1.2

If an attacker can sit between you and your data, they’ll have access to a wealth of information. In this video, you’ll learn about man-in-the-middle attacks and what you can do to prevent them. << Previous Video: Denial of Service Next: Buffer Overflows >> We usually consider our network communication to be private. We’re communicating

Man-in-the-Middle – CompTIA Security+ SY0-501 – 1.2 Read More »

Denial of Service – CompTIA Security+ SY0-501 – 1.2

If your services aren’t working, then you are effectively out of business. In this video, you’ll learn how denial of service attacks are used to prevent access to your important business systems. << Previous Video: Principles of Social Engineering Next: Man-in-the-Middle >>–> A denial of service is when the bad guys are taking a service

Denial of Service – CompTIA Security+ SY0-501 – 1.2 Read More »

Principles of Social Engineering – CompTIA Security+ SY0-501 – 1.2

Someone who’s well-versed in social engineering can easily talk their way into your network. In this video, you’ll learn about social engineering principles and what you can look for to protect against these attacks. << Previous Video: Watering Hole Attacks Next: Denial of Service >> Social engineering is a very low tech form of a

Principles of Social Engineering – CompTIA Security+ SY0-501 – 1.2 Read More »