CompTIA Network+: Common Network Attack Types
CompTIA Network+
| Intermediate
- 12 videos | 1h 8m 37s
- Includes Assessment
- Earns a Badge
Network security encompasses best practices and policies that are put in place to help monitor and prevent malicious attacks against both internal and external threats. In this course, learn about various types of attacks and their impact on the network, beginning with denial-of-service (DoS) and distributed denial-of-service (DDoS) attacks, VLAN hopping attacks, MAC flooding attacks, and ARP poisoning attacks. Next, explore ARP and DNS spoofing attacks and the characteristics and purposes of DNS poisoning attacks. Finally, discover the threats posed by rogue devices and services, evil twin attacks, on-path attacks, social engineering attacks, and malware attacks. This course is one of a collection that helps prepare learners for the CompTIA Network+ (N10-009) certification exam.
WHAT YOU WILL LEARN
-
Discover the key concepts covered in this courseOutline the purpose and characteristics of denial-of-service (dos) and distributed denial-of-service (ddos) attacksRecognize characteristics of vlan hopping attacksDescribe how mac flooding targets network switchesIdentify characteristics of address resolution protocol (arp) spoofing and poisoning attacks and how arp spoofing enables attackers to intercept communication between network devicesOutline the purpose of dns poisoning attacks and how threat actors use dns spoofing to redirect traffic to fraudulent websites
-
Describe the threat of malicious pieces of hardware on a network, such as dhcp and access pointsRecognize how evil twin attacks can be used to trick users into connecting to a fake wi-fi access pointOutline the purpose and characteristics of an on-path attackIdentify how social engineering attacks are carried outRecognize best practices for preventing malware attacksSummarize the key concepts covered in this course
IN THIS COURSE
-
1m 11sIn this video, we will discover the key concepts covered in this course. FREE ACCESS
-
7m 38sUpon completion of this video, you will be able to outline the purpose and characteristics of denial-of-service (DoS) and distributed denial-of-service (DDoS) attacks. FREE ACCESS
-
3m 53sThrough this video, you will be able to recognize characteristics of VLAN hopping attacks. FREE ACCESS
-
5m 11sAfter completing this video, you will be able to describe how MAC flooding targets network switches. FREE ACCESS
-
7m 17sIn this video, we will identify characteristics of address resolution protocol (ARP) spoofing and poisoning attacks and how ARP spoofing enables attackers to intercept communication between network devices. FREE ACCESS
-
8m 12sUpon completion of this video, you will be able to outline the purpose of DNS poisoning attacks and how threat actors use DNS spoofing to redirect traffic to fraudulent websites. FREE ACCESS
-
7m 55sAfter completing this video, you will be able to describe the threat of malicious pieces of hardware on a network, such as DHCP and access points. FREE ACCESS
-
7m 6sThrough this video, you will be able to recognize how evil twin attacks can be used to trick users into connecting to a fake Wi-Fi access point. FREE ACCESS
-
5m 36sUpon completion of this video, you will be able to outline the purpose and characteristics of an on-path attack. FREE ACCESS
-
8m 19sAfter completing this video, you will be able to identify how social engineering attacks are carried out. FREE ACCESS
-
5m 39sThrough this video, you will be able to recognize best practices for preventing malware attacks. FREE ACCESS
-
42sIn this video, we will summarize the key concepts covered in this course. FREE ACCESS
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.
Digital badges are yours to keep, forever.