Autoplay
Autocomplete
Previous Lesson
Complete and Continue
CompTIA Network+
Understanding Network Security Risks
01. Overview (3:47)
02. Case Study Network (2:00)
03. Uptime vs. Availability (3:08)
04. DR vs. Business Continuity (2:01)
05. Risk (1:46)
06. Critical Nodes and Assets (1:42)
07. Avoiding a Single Point of Failure (4:20)
08. Data Breaches (3:41)
09. DR Standards and Policies (1:59)
10. Demo 1 Reviewing Security Plan Documents (2:08)
11. Proactive Network Protection (2:14)
12. Demo 2 Using Nessus (3:58)
13. Case Study Network, Revisited (1:01)
14. For Further Learning (0:28)
15. Summary (1:04)
Analyzing Network Attacks and Threats
01. Overview (3:44)
02. Denial of Service (5:06)
03. Distributed Denial of Service (2:51)
04. IRC and LOIC (2:06)
05. Smurf Attack (1:35)
06. ReflectionAmplification Attack (1:24)
07. Ethernet Protocol Abuse (3:04)
08. Man-in-the-middle Attack (1:03)
09. The Importance of ARP (0:55)
10. SYN Flood Attack (1:17)
11. VLAN Hopping and Brute Force Attacks (3:09)
12. Demo 1 Executing an MITM Attack (3:52)
13. Human Factors (0:46)
14. Compromised System (2:00)
15. Demo 2 Cracking Passwords (3:00)
16. For Further Learning (0:32)
17. Summary (1:14)
Identifying Network Vulnerabilities
01. Overview (3:11)
02. Evil Twin (4:15)
03. Wardriving and Warchalking (3:18)
04. Understanding Wi-Fi Statistics (3:23)
05. Bluejacking and Bluesnarfing (1:34)
06. WEPWPAWPS Vulnerabilities (2:31)
07. WLAN Protection Mechanisms (2:31)
08. Demo 1 Introducing Wi-Fi Monitoring Tools (3:36)
09. ClientServer Vulnerabilities (2:45)
10. Open Ports (2:26)
11. Unsecure Protocols (1:59)
12. Verifying File Integrity (1:47)
13. TEMPEST (1:04)
14. Demo 2 Exposing Unsecure Protocols (3:25)
15. For Further Learning (0:32)
16. Summary (1:03)
Hardening a Network - Hardware
01. Overview (3:44)
02. Security Policies (3:21)
03. Demo 1 Investigating Security Policies (4:38)
04. Switch Port Security (6:12)
05. VLANs (3:02)
06. Demo 2 Experimenting with VLANs (3:34)
07. Access Lists (4:21)
08. Web Content Filtering (2:31)
09. Wi-Fi Security Protocols (3:00)
10. IEEE 802.1X (1:26)
11. Other Wi-Fi Security Options (1:09)
12. For Further Learning (0:21)
13. Summary (0:57)
Hardening a Network - Software
01. Overview (2:45)
02. Services (5:14)
03. Malware and Anti-malware Software (4:52)
04. Demo 1 Configuring Services and Anti-malware (3:41)
05. Secure Protocols (3:29)
06. FTPS vs. SFTP (3:57)
07. How TLSSSL Works (1:29)
08. Hashing Functions (2:24)
09. Demo 2 Hashing and TLS in Action (3:54)
10. Definition Authentication (0:53)
11. User Authentication Basics (2:56)
12. User Authentication Protocols (2:20)
13. For Further Learning (0:33)
14. Summary (0:36)
Investigating Network Security Controls
01. Overview (1:55)
02.Physical Security Basics (3:48)
03. Mantraps (3:41)
04. Network Closets (3:54)
05. Video Monitoring (4:30)
06. Door Access Controls (3:57)
07. Biometrics (1:56)
08. For Further Learning (0:47)
09. Summary (1:37)
Installing and Configuring a Basic Firewall
01. Overview (3:34)
02. Firewall Basics (5:28)
03. Firewall Types (4:45)
04. Unified Threat Management (1:33)
05. Demo 1 Managing Host-based Firewalls (4:05)
06. Zones of Trust (1:46)
07. Firewall Placement (1:57)
08. Routed vs. Virtual Wire Firewall Interfaces (1:52)
09. Access Control Lists (1:16)
10. Demo 2 Configuring ACL Rules (5:09)
11. For Further Learning (0:45)
12. Summary (1:37)
Differentiating Network Access Control Models
01. Overview (2:54)
02. Network Access Control Basics (4:33)
03. NAC Agent Software (2:33)
04. Network Access Protection (NAP) (2:40)
05. Cisco NAC (3:14)
06. Demo 1 Configuring NAP DHCP Enforcement (6:30)
07. Demo 2 Testing NAP (1:37)
08. Case Study Network, Revisited (1:06)
09. For Further Learning (0:56)
10. Summary (1:19)
Summarizing Basic Forensic Concepts
01. Overview (2:00)
02. A Personal Story (1:59)
03. Defining Computer Forensics (1:15)
04. Forensic Concepts (3:29)
05. Incident Response Policy (1:57)
06. Evidence and Data Collection (1:53)
07. EnCase Forensic (0:56)
08. Demo 1 Reviewing a Response Policy (4:00)
09. Electronic Discovery Concepts (2:33)
10. Demo 2 Preparing for eDiscovery in Office 365 (3:54)
11. Demo 3 Working with eDiscovery in SharePoint Online (3:32)
12. For Further Learning (0:40)
13. Summary (1:07)
Teach online with
04. DR vs. Business Continuity
Lesson content locked
If you're already enrolled,
you'll need to login
.
Enroll in Course to Unlock