CompTIA Security+ SY0-601

MAC Flooding and Cloning – SY0-601 CompTIA Security+ : 1.4

An attacker can sometimes manipulate network traffic to gain unauthorized access to information. In this video, you’ll learn about MAC flooding and MAC cloning or spoofing. << Previous Video: On-Path Attacks Next: DNS Attacks >>     In networking, the term MAC address refers to the Media Access Control address of a network card. We

MAC Flooding and Cloning – SY0-601 CompTIA Security+ : 1.4 Read More »

Randomizing Cryptography – SY0-601 CompTIA Security+ : 1.4

Cryptography isn’t very useful without randomization. In this video, you’ll learn about cryptographic nonces, initialization vectors, and salting. << Previous Video: RFID and NFC Attacks Next: On-Path Attacks >>     One of the core elements of cryptography is that there is a sufficient amount of randomization that the resulting encrypted data looks nothing like

Randomizing Cryptography – SY0-601 CompTIA Security+ : 1.4 Read More »

RFID and NFC Attacks – SY0-601 CompTIA Security+ : 1.4

RFID and NFC have become common technologies on our mobile devices. In this video, you’ll learn about security concerns associated with RFID and NFC and what type of attacks might be associated with these technologies. << Previous Video: Wireless Jamming Next: Randomizing Cryptography >>     RFID stands for Radio-Frequency Identification. And it’s a technology

RFID and NFC Attacks – SY0-601 CompTIA Security+ : 1.4 Read More »

Wireless Disassociation Attacks – SY0-601 CompTIA Security+ : 1.4

An encrypted wireless network may not stop all types of attacks. In this video, I’ll demonstrate a wireless disassociation attacks and you’ll learn how to prevent them. << Previous Video: Bluejacking and Bluesnarfing Next: Wireless Jamming >> Let’s say you’re using your wireless network and it’s working exactly the way you would expect, except suddenly

Wireless Disassociation Attacks – SY0-601 CompTIA Security+ : 1.4 Read More »

Bluejacking and Bluesnarfing – SY0-601 CompTIA Security+ : 1.4

Bluetooth technology is now quite robust and secure, but it wasn’t always that way. In this video, you’ll learn about unwanted Bluejacking messages and how attackers were able to retrieve information from your phone with Bluesnarfing. << Previous Video: Rogue Access Points and Evil Twins Next: Wireless Disassociation Attacks >> Bluejacking is an attacker sending

Bluejacking and Bluesnarfing – SY0-601 CompTIA Security+ : 1.4 Read More »

Rogue Access Points and Evil Twins – SY0-601 CompTIA Security+ : 1.4

An unwanted wireless access point can be a significant security concern. In this video, you’ll learn about rogue access points, evil twins, and how to prevent or limit the use these wireless technologies. << Previous Video: Other Application Attacks Next: Bluejacking and Bluesnarfing >> A rogue access point is an access point that has been

Rogue Access Points and Evil Twins – SY0-601 CompTIA Security+ : 1.4 Read More »