I didn’t bring my umbrella
You have a central laser printer in your organization that needs to be accessed by users on multiple floors of the building. Which type of network connection would be the best type for this printer?
You have a central laser printer in your organization that needs to be accessed by users on multiple floors of the building. Which type of network connection would be the best type for this printer?
If a security event occurs in your organization, how would you handle it? In this video, you’ll learn some of the techniques used when dealing with a security incident.
Incident Response – CompTIA Network+ N10-005: 5.4 Read More »
Security policies are standard requirements for most organizations. In this video, you’ll learn about the best practices for security policies and ways to keep your user community updated with the latest information about security policies and procedures.
Policies and Procedures – CompTIA Network+ N10-005: 5.4 Read More »
An important security practice is keeping your system and applications up-to-date. In this video, you’ll learn about patch management techniques and protecting your computer with timely updates.
Patch Management – CompTIA Network+ N10-005: 5.4 Read More »
With the right training, your end-users can be a valuable security measure. In this video, you’ll learn some techniques for training your end-users and making them aware of today’s modern security concerns.
End-User Security Training and Awareness – CompTIA Network+ N10-005: 5.4 Read More »
The FTP bounce attack is an example of how a legitimate application can be used for other purposes. In this video, you’ll learn how this legacy attack type works and how it was used to manipulate systems.
FTP Bounce Attacks – CompTIA Network+ N10-005: 5.4 Read More »
If you can see the packets, then you see everything. In this video, you’ll learn about packet analysis and how packet-based attacks can provide the hacker with extensive information about your traffic patterns and application data.
Packet Sniffing Attacks – CompTIA Network+ N10-005: 5.4 Read More »
A buffer overflow is a common application weakness, and exploiting a buffer overflow can provide the hacker with extensive control over your computer system. In this video, you’ll learn the basics of buffer overflows and how they are used to take over your PC.
Buffer Overflow Attacks – CompTIA Network+ N10-005: 5.4 Read More »
One of the most common attacks come from viruses and malware, and some worms have caused extensive damage in a very short period of time. In this video, you’ll learn about virus and worm attacks and some of the techniques for preventing damage from these attacks.
Virus and Worm Attacks – CompTIA Network+ N10-005: 5.4 Read More »
A social engineering attack is one of the most targeted attacks you’ll find, and it’s also the least technical. In this video, you’ll learn about social engineering and some of the techniques that the bad guys use to infiltrate our ranks using social engineering.
Social Engineering Attacks – CompTIA Network+ N10-005: 5.4 Read More »