There are a number of different methods that the bad guys can use to attack your systems. In this video, you’ll learn how to recognize and protect yourself from the most well-known security threats.
The redirection of traffic without the knowledge of the endpoints is a significant security concern. In this video, you’ll learn about man in the middle attacks and how a bad guy can use ARP poisoning to spoof and redirect network traffic.
The bad guys are very good at providing fake information to us. In this video, you’ll learn how spoofing works and how pharming and phishing have become common ways to illicitly obtain our private information.