CompTIA Network+: Common Network Attack Types

CompTIA Network+    |    Intermediate
  • 12 videos | 1h 8m 37s
  • Includes Assessment
  • Earns a Badge
Network security encompasses best practices and policies that are put in place to help monitor and prevent malicious attacks against both internal and external threats. In this course, learn about various types of attacks and their impact on the network, beginning with denial-of-service (DoS) and distributed denial-of-service (DDoS) attacks, VLAN hopping attacks, MAC flooding attacks, and ARP poisoning attacks. Next, explore ARP and DNS spoofing attacks and the characteristics and purposes of DNS poisoning attacks. Finally, discover the threats posed by rogue devices and services, evil twin attacks, on-path attacks, social engineering attacks, and malware attacks. This course is one of a collection that helps prepare learners for the CompTIA Network+ (N10-009) certification exam.

WHAT YOU WILL LEARN

  • Discover the key concepts covered in this course
    Outline the purpose and characteristics of denial-of-service (dos) and distributed denial-of-service (ddos) attacks
    Recognize characteristics of vlan hopping attacks
    Describe how mac flooding targets network switches
    Identify characteristics of address resolution protocol (arp) spoofing and poisoning attacks and how arp spoofing enables attackers to intercept communication between network devices
    Outline the purpose of dns poisoning attacks and how threat actors use dns spoofing to redirect traffic to fraudulent websites
  • Describe the threat of malicious pieces of hardware on a network, such as dhcp and access points
    Recognize how evil twin attacks can be used to trick users into connecting to a fake wi-fi access point
    Outline the purpose and characteristics of an on-path attack
    Identify how social engineering attacks are carried out
    Recognize best practices for preventing malware attacks
    Summarize the key concepts covered in this course

IN THIS COURSE

  • 1m 11s
    In this video, we will discover the key concepts covered in this course. FREE ACCESS
  • 7m 38s
    Upon completion of this video, you will be able to outline the purpose and characteristics of denial-of-service (DoS) and distributed denial-of-service (DDoS) attacks. FREE ACCESS
  • Locked
    3.  VLAN Hopping Attacks
    3m 53s
    Through this video, you will be able to recognize characteristics of VLAN hopping attacks. FREE ACCESS
  • Locked
    4.  Media Access Control (MAC) Flooding Attacks
    5m 11s
    After completing this video, you will be able to describe how MAC flooding targets network switches. FREE ACCESS
  • Locked
    5.  Address Resolution Protocol (ARP) Spoofing and Poisoning Attacks
    7m 17s
    In this video, we will identify characteristics of address resolution protocol (ARP) spoofing and poisoning attacks and how ARP spoofing enables attackers to intercept communication between network devices. FREE ACCESS
  • Locked
    6.  DNS Poisoning and Spoofing Attacks
    8m 12s
    Upon completion of this video, you will be able to outline the purpose of DNS poisoning attacks and how threat actors use DNS spoofing to redirect traffic to fraudulent websites. FREE ACCESS
  • Locked
    7.  Rogue Devices and Services
    7m 55s
    After completing this video, you will be able to describe the threat of malicious pieces of hardware on a network, such as DHCP and access points. FREE ACCESS
  • Locked
    8.  Evil Twin Attacks
    7m 6s
    Through this video, you will be able to recognize how evil twin attacks can be used to trick users into connecting to a fake Wi-Fi access point. FREE ACCESS
  • Locked
    9.  On-Path Attacks
    5m 36s
    Upon completion of this video, you will be able to outline the purpose and characteristics of an on-path attack. FREE ACCESS
  • Locked
    10.  Social Engineering Attacks
    8m 19s
    After completing this video, you will be able to identify how social engineering attacks are carried out. FREE ACCESS
  • Locked
    11.  Common Malware Attacks
    5m 39s
    Through this video, you will be able to recognize best practices for preventing malware attacks. FREE ACCESS
  • Locked
    12.  Course Summary
    42s
    In this video, we will summarize the key concepts covered in this course. FREE ACCESS

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Rating 4.6 of 30 users Rating 4.6 of 30 users (30)
Rating 4.5 of 81 users Rating 4.5 of 81 users (81)
Rating 4.4 of 5 users Rating 4.4 of 5 users (5)