Today’s SY0-601 Security+ Pop Quiz: That’s a bit too literal
Today’s SY0-601 Security+ Pop Quiz: That’s a bit too literal Read More »
Spoofing allows an attacker to appear as a legitimate network user. In this video, you’ll learn about IP spoofing, MAC spoofing, and how to identify and stop these attack types. << Previous Video: VLAN Hopping Next Video: Rogue Services >> If there’s a device on your network that is pretending to be a completely different
VLANs are designed to prevent communication between subnets. In this video, you’ll learn how an attacker can use VLAN hopping to circumvent VLAN segmentation. << Previous Video: On-path Attacks Next Video: Spoofing >> If you look at the network configuration on your enterprise network, you’ll notice there are many different VLANs that have been configured.
If an attacker can get into the middle of a conversation, they can effectively read and modify all network communication. In this video, you’ll learn about on-path attacks and how to prevent them. << Previous Video: Denial of Service Next Video: VLAN Hopping >> When we communicate to a web server, we’re usually assuming that
On-path Attacks – N10-008 CompTIA Network+ : 4.2 Read More »
Some attackers are interested in causing as much downtime as possible. In this video, you’ll learn about denial of service attacks and how bots and botnets are used to create network service outages. << Previous Video: Risk Management Next Video: On-path Attacks >> A very broad description of a denial of service is when someone
Denial of Service – N10-008 CompTIA Network+ : 4.2 Read More »