I have a lot of Os and Is left over
Which of these use RC4 with TKIP?
There are many techniques that we can use to make our operating systems less vulnerable to attack. In this video, you’ll learn about operating system vulnerabilities and the methods that the bad guys use to take advantage of these vulnerabilities.
Operating System Vulnerabilities – CompTIA Network+ N10-006 – 3.2 Read More »
The applications that we use across our networks can hide vulnerabilities that haven’t yet been discovered by the general public. In this video, you’ll learn about zero-day attacks that take advantage of these vulnerabilities.
Zero-day Attacks – CompTIA Network+ N10-006 – 3.2 Read More »
Some of our largest security concerns aren’t necessarily on the outside of your network. In this video, you’ll learn about the scope of insider threats.
Insider Threats – CompTIA Network+ N10-006 – 3.2 Read More »
If the bad guys can gain access to a system, they can use it for many (often bad) purposes. In this video, you’ll learn about compromised systems and how a single compromised system can ultimately cause the theft of over 40 million credit card numbers.
Compromised Systems – CompTIA Network+ N10-006 – 3.2 Read More »
A properly configured network should never allow users to communicate between broadcast domains. In this video, you’ll learn how switch spoofing and double tagging can be used to hop between VLANs.
The redirection of traffic without the knowledge of the endpoints is a significant security concern. In this video, you’ll learn about man in the middle attacks and how a bad guy can use ARP poisoning to spoof and redirect network traffic.
Man in the Middle Attacks – CompTIA Network+ N10-006 – 3.2 Read More »
When you start your computer, the screen remains blank and beeps four times. Which of these would be the most likely cause of this problem?