Permission granted, Mr. Bond
Which of these wireless encryption types include centralized authentication?
Which of these wireless encryption types include centralized authentication?
Which of these network types would you expect to find on an iOS or Android mobile device? Pick two.
Which of these would be the best encryption type to use on a wireless network?
Isthay an’tcay ossiblypay ebay away oodgay ideaway Read More »
There are many hash functions for many different circumstances. In this video, you’ll learn about MD5, SHA, RIPEMD, and HMAC hash functions.
Cryptographic Hash Functions – CompTIA Security+ SY0-401: 6.2 Read More »
802.11 networks rely on encryption to ensure the security of all wireless traffic. In this video, you’ll learn about WEP and WPA encryption and the dangers of using the wrong encryption on your wireless network.
If you can’t break the encryption, maybe you can break down the door. In this video, you’ll learn about a significant security flaw in wireless devices that use WPS.
An encryption technology doesn’t have to suffer from a cryptographic flaw to be susceptible to attack. In this video, you’ll learn how an encryption protocol as strong as WPA can be successfully hacked.
Flaws in WEP encryption were exploited using a series of replays and very specific cryptographic attacks. In this video, you’ll learn the process that the bad guys used to break WEP encryption.
Wireless Replay and WEP Attacks – CompTIA Security+ SY0-401: 3.4 Read More »
Our mobile devices are used for communication, entertainment, and now for near-field applications. In this video, you’ll learn about near field communication and how this may change our perspective on mobile security.
Near Field Communication – CompTIA Security+ SY0-401: 3.4 Read More »