URL Hijacking – CompTIA Security+ SY0-401: 3.2
One way to redirect your browsing activity is to force you to a site that you weren’t intending to visit. In this video, you’ll learn the techniques used to hijack URLs.
One way to redirect your browsing activity is to force you to a site that you weren’t intending to visit. In this video, you’ll learn the techniques used to hijack URLs.
The bad guys don’t need to know your password; they’ll figure it out themselves. In this video, you’ll learn the techniques that the bad guys use to reverse-engineer your password.
Password Attacks – CompTIA Security+ SY0-401: 3.2 Read More »
If the bad guys can’t attack a server directly, then they’ll try going through a trusted neighbor. In this video, you’ll learn how transitive attacks and attacks against the clients have become significant security concerns.
Transitive and Client-side Attacks – CompTIA Security+ SY0-401: 3.2 Read More »
A huge security risk is on the inside of your network. In this video, you’ll learn about insider threats and what you can to do help secure yourself from this very intimate security concern.
Insider Threats – CompTIA Security+ SY0-401: 3.2 Read More »
If a bad guy can escalate the privileges of a regular user, he’ll have greater access to the system. In this video, you’ll learn about privilege escalation and how to mitigate privilege escalation.
Privilege Escalation – CompTIA Security+ SY0-401: 3.2 Read More »
By changing a few bits inside of a network packet, you can cause a number of things to occur. In this video, you’ll learn about Xmas tree attacks and you’ll see what happens when I run a Christmas tree attack against my own router.
Christmas Tree Attack – CompTIA Security+ SY0-401: 3.2 Read More »
Why would the bad guys hack into your computer when they could just give you a call? In this video, you’ll learn about vishing (voice phishing), and how the bad guys can even fool you into calling them yourself.
The bad guys know that the easiest way to steal your information is to have you type it in for them yourself. In this video, you’ll learn how phishing happens and things you can do to protect against phishing and spear phishing.
Unsolicited emails are an ongoing security concern. In this video, you’ll learn about spam, spim, and spit.
The bad guys are very good at providing fake information to us. In this video, you’ll learn how spoofing works and how pharming and phishing have become common ways to illicitly obtain our private information.