Free CompTIA Security+ Training

WPS Attacks – CompTIA Security+ SY0-501 – 1.2

The WPS protocol has suffered from vulnerabilities and active exploits from its introduction. In this video, you’ll learn more about WPS and why security professionals recommend disabling of all WPS functions. << Previous Video: Wireless Jamming Next: Bluejacking and Bluesnarfing >>–> WPS stands for Wi-Fi Protected Setup. it was originally called Wi-Fi Simple Config. 7 […]

WPS Attacks – CompTIA Security+ SY0-501 – 1.2 Read More »

Wireless Jamming – CompTIA Security+ SY0-501 – 1.2

A wireless network is especially susceptible to wireless jamming. In this video, you’ll learn about wireless jamming techniques and how to stop a wireless jamming attack. << Previous Video: Rogue Access Points and Evil Twins Next: WPS Attacks >> – There’s nothing really good that comes from wireless jamming. This is jamming the radio frequencies

Wireless Jamming – CompTIA Security+ SY0-501 – 1.2 Read More »

Rogue Access Points and Evil Twins – CompTIA Security+ SY0-501 – 1.2

A single poorly-placed access point can ruin your day. In this video, you’ll learn about rogue access points and evil twins, and you’ll learn how to prevent rogue access points and mitigate the presence of a potential evil twin. << Previous Video: Wireless Replay Attacks Next: Wireless Jamming >> Imagine if someone could simply connect

Rogue Access Points and Evil Twins – CompTIA Security+ SY0-501 – 1.2 Read More »

Wireless Replay Attacks – CompTIA Security+ SY0-501 – 1.2

A replay attack on a wireless network can be used to take advantage of a vulnerability in wireless protocols. In this video, I’ll demonstrate how a limitation in WEP can be used to speed the identification of the WEP shared password. << Previous Video: Spoofing Next: Rogue Access Points and Evil Twins >> When you’re

Wireless Replay Attacks – CompTIA Security+ SY0-501 – 1.2 Read More »

Driver Manipulation – CompTIA Security+ SY0-501 – 1.2

Our device drivers have direct access to hardware and the operating system. In this video, you’ll learn how attackers can manipulate hardware drivers to gain access to your information. << Previous Video: Client Hijacking Attacks Next: Spoofing >> The traditional anti-virus and anti-malware software that we use on our workstations is very good at identifying

Driver Manipulation – CompTIA Security+ SY0-501 – 1.2 Read More »

Zero-Day Attacks – CompTIA Security+ SY0-501 – 1.2

There are unknown vulnerabilities in our operating systems and applications, and it’s a race to see who can exploit them first. In this video, you’ll learn about zero-day attacks and what you can do to prevent an unforeseen attack. << Previous Video: DNS Poisoning and Domain Hijacking Next: Replay Attacks >> The operating systems and

Zero-Day Attacks – CompTIA Security+ SY0-501 – 1.2 Read More »

DNS Poisoning and Domain Hijacking – CompTIA Security+ SY0-501 – 1.2

If you can’t hack the user, maybe you can hack the DNS server. In this video, you’ll learn how a DNS poisoning attack or domain hijacking can allow an attacker to seamlessly impersonate an entire company. << Previous Video: Privilege Escalation Next: Zero-Day Attacks >> The domain name services are a critical part of our

DNS Poisoning and Domain Hijacking – CompTIA Security+ SY0-501 – 1.2 Read More »