N10-008 Videos

Network Troubleshooting Methodology – N10-008 CompTIA Network+ : 5.1

The fundamentals of troubleshooting remain consistent across the network. In this video, you’ll learn how to break problems into smaller pieces and how to methodically solve complex issues. << Previous Video: Physical Security Next Video: Cable Connectivity >> As a network administrator, you’ll be doing a lot of troubleshooting. In this video, we’ll step through […]

Network Troubleshooting Methodology – N10-008 CompTIA Network+ : 5.1 Read More »

Physical Security – N10-008 CompTIA Network+ : 4.5

There are many physical security tools and techniques that we use to keep our networks safe. In this video, you’ll learn about video surveillance, asset tracking tags, access control hardware, smart lockers, and more. << Previous Video: Remote Access Next Video: Network Troubleshooting Methodology >> Almost every organization has some type of video surveillance, and

Physical Security – N10-008 CompTIA Network+ : 4.5 Read More »

Network Hardening – N10-008 CompTIA Network+ : 4.3

There are many best-practices when hardening a network. In this video, you’ll learn about SNMP versions, port security, private VLANs, and much more. << Previous Video: Social Engineering Next Video: Wireless Security >> If you’re a network administrator, then you’re probably using SNMP, or the Simple Network Management Protocol, to be able to query and

Network Hardening – N10-008 CompTIA Network+ : 4.3 Read More »

Social Engineering – N10-008 CompTIA Network+ : 4.2

Attackers often use social engineering to gain access to a physical building or confidential data. In this video, you’ll learn about phishing, tailgating, piggybacking, and shoulder surfing. << Previous Video: Deauthentication Next Video: Network Hardening >> If you’ve ever received an email message or a text message that’s encouraging you to visit a website or

Social Engineering – N10-008 CompTIA Network+ : 4.2 Read More »

Deauthentication – N10-008 CompTIA Network+ : 4.2

Older 802.11 networks are susceptible to deauthentication attacks. In this video, you’ll learn how deauthentication attacks work and how to prevent them on your wireless network. << Previous Video: Password Attacks Next Video: Social Engineering >> Here’s a scenario you might find yourself in. You’re on a wireless network, working normally, and then all of

Deauthentication – N10-008 CompTIA Network+ : 4.2 Read More »

Password Attacks – N10-008 CompTIA Network+ : 4.2

Attackers have many tools for attacking passwords and user credentials. In this video, you’ll learn about password hashes, brute force attacks, and dictionary attacks. << Previous Video: Malware and Ransomware Next Video: Deauthentication >> We use usernames and passwords to authenticate into many different systems. This could be an operating system or an application. But

Password Attacks – N10-008 CompTIA Network+ : 4.2 Read More »

Malware and Ransomware – N10-008 CompTIA Network+ : 4.2

Malware infections can create unexpected downtime and data breaches. In this video, you’ll learn about malware and ransomware. << Previous Video: Rogue Services Next Video: Password Attacks >> Malware is software that’s been installed onto your system that’s designed to be malicious. For example, you might have malware installed that gathers information from the keystrokes

Malware and Ransomware – N10-008 CompTIA Network+ : 4.2 Read More »