Free CompTIA Security+ Training

Wireless Jamming – CompTIA Security+ SY0-501 – 1.2

A wireless network is especially susceptible to wireless jamming. In this video, you’ll learn about wireless jamming techniques and how to stop a wireless jamming attack. << Previous Video: Rogue Access Points and Evil Twins Next: WPS Attacks >> – There’s nothing really good that comes from wireless jamming. This is jamming the radio frequencies […]

Wireless Jamming – CompTIA Security+ SY0-501 – 1.2 Read More »

Rogue Access Points and Evil Twins – CompTIA Security+ SY0-501 – 1.2

A single poorly-placed access point can ruin your day. In this video, you’ll learn about rogue access points and evil twins, and you’ll learn how to prevent rogue access points and mitigate the presence of a potential evil twin. << Previous Video: Wireless Replay Attacks Next: Wireless Jamming >> Imagine if someone could simply connect

Rogue Access Points and Evil Twins – CompTIA Security+ SY0-501 – 1.2 Read More »

Wireless Replay Attacks – CompTIA Security+ SY0-501 – 1.2

A replay attack on a wireless network can be used to take advantage of a vulnerability in wireless protocols. In this video, I’ll demonstrate how a limitation in WEP can be used to speed the identification of the WEP shared password. << Previous Video: Spoofing Next: Rogue Access Points and Evil Twins >> When you’re

Wireless Replay Attacks – CompTIA Security+ SY0-501 – 1.2 Read More »

Driver Manipulation – CompTIA Security+ SY0-501 – 1.2

Our device drivers have direct access to hardware and the operating system. In this video, you’ll learn how attackers can manipulate hardware drivers to gain access to your information. << Previous Video: Client Hijacking Attacks Next: Spoofing >> The traditional anti-virus and anti-malware software that we use on our workstations is very good at identifying

Driver Manipulation – CompTIA Security+ SY0-501 – 1.2 Read More »

Zero-Day Attacks – CompTIA Security+ SY0-501 – 1.2

There are unknown vulnerabilities in our operating systems and applications, and it’s a race to see who can exploit them first. In this video, you’ll learn about zero-day attacks and what you can do to prevent an unforeseen attack. << Previous Video: DNS Poisoning and Domain Hijacking Next: Replay Attacks >> The operating systems and

Zero-Day Attacks – CompTIA Security+ SY0-501 – 1.2 Read More »

DNS Poisoning and Domain Hijacking – CompTIA Security+ SY0-501 – 1.2

If you can’t hack the user, maybe you can hack the DNS server. In this video, you’ll learn how a DNS poisoning attack or domain hijacking can allow an attacker to seamlessly impersonate an entire company. << Previous Video: Privilege Escalation Next: Zero-Day Attacks >> The domain name services are a critical part of our

DNS Poisoning and Domain Hijacking – CompTIA Security+ SY0-501 – 1.2 Read More »

Privilege Escalation – CompTIA Security+ SY0-501 – 1.2

The fastest way to become the system administrator is to steal it. In this video, you’ll learn how privilege escalation can instantly take you from zero to user 0. << Previous Video: Cross-site Request Forgery Next: DNS Poisoning and Domain Hijacking >> Privilege escalation is the type of vulnerability you really don’t want to have

Privilege Escalation – CompTIA Security+ SY0-501 – 1.2 Read More »