Spam – CompTIA Security+ SY0-401: 3.2
Unsolicited emails are an ongoing security concern. In this video, you’ll learn about spam, spim, and spit.
Unsolicited emails are an ongoing security concern. In this video, you’ll learn about spam, spim, and spit.
The bad guys are very good at providing fake information to us. In this video, you’ll learn how spoofing works and how pharming and phishing have become common ways to illicitly obtain our private information.
Even if the bad guys can’t hack into your system, they may be able to temporarily morph into something that looks exactly like you. In this video, you’ll learn how replay attacks can be used to gain inappropriate access to devices and how software developers can protect against replay attacks.
Denial of service attacks are very difficult to defend against. In this video, you’ll learn about denial of service attacks and you’ll see how one of the first DoS attacks, the Smurf attack, was able to disrupt services on many networks.
Denial of Service – CompTIA Security+ SY0-401: 3.2 Read More »
One challenge with modern network security is protecting against man-in-the-middle attacks. In this video, you’ll learn about man-in-the-middle and I’ll demonstrate a live MiTM attack.
Man-in-the-Middle Attacks – CompTIA Security+ SY0-401: 3.2 Read More »
The virus developers know that the secret to remaining active is to hide as much as possible. In this video, you’ll learn how virus programmers use obfuscation to create armored viruses.
Polymorphic malware is constantly changing, and this makes it difficult to identify and remove. In this video, you’ll learn about polymorphic malware and the methods that we’re using to control and eradicate this malicious software.
Polymorphic Malware – CompTIA Security+ SY0-401: 3.1 Read More »
Ransomware is a specific kind of malware that goes directly after your wallet. In this video, you’ll learn some of techniques that ransomware uses to get your money.
The remote-control of a botnet has the ability to cause significant harm to our computers and our assets. In this video, you’ll learn how botnets work and how one of the largest botnets in history has become very good at taking money out of our bank accounts.
Logic bombs can be very destructive and can reside in our systems with near invisibility until they trigger. In this video, you’ll learn about common logic bomb categorizations and some real-world examples of logic bombs.