Any password-based security system can be attacked by trying every possible password. In this video, you’ll learn about brute force attacks, password files, and how hackers can abbreviate the brute force process with dictionaries.
Different dynamic routing protocols build their routing tables in different ways. In this video, you’ll learn about the methods used by link state, distance vector, and hybrid routing protocols.
Understanding traffic flows across topologies can help with the design and troubleshooting of our networks. In this video, you’ll learn about topologies such as mesh, bus, ring, star, and hybrid networks.