#11 2 – Basic Switch and End Device Configuration
2.0.2 – What will I learn to do in the module?
#12 2: Network Threats
2.1: Who is Attacking Our Network?
#13 2: Network Threats
2.1: Who is Attacking Our Network?
2.1.1: Threat, Vulnerability, and Risk
#14 2: Network Threats
2.1: Who is Attacking Our Network?
2.1.2: Hacker vs. Threat Actor
#15 2: Network Threats
2.1: Who is Attacking Our Network?
2.1.3: Evolution of Threat Actors
#16 2: Network Threats
2.1: Who is Attacking Our Network?
2.1.4: Cybercriminals
#17 2: Network Threats
2.1: Who is Attacking Our Network?
2.1.5: Cybersecurity Tasks
#18 2: Network Threats
2.1: Who is Attacking Our Network?
2.1.6: Cyber Threat Indicators
#19 2: Network Threats
2.1: Who is Attacking Our Network?
2.1.7: Threat Sharing and Building Cybersecurity Awareness
2.1.8: Check Your Understanding - What Color is my Hat?
#35 2: Network Threats
2.3: Malware
2.3.8: Other Malware
#36 2: Network Threats
2.3: Malware
2.3.9: Common Malware Behaviors
2.3.10: Check Your Understanding - Malware
#37 2: Network Threats
2.4: Common Network Attacks - Reconnaissance, Access, and Social Engineering
#38 2: Network Threats
2.4: Common Network Attacks - Reconnaissance, Access, and Social Engineering
2.4.1: Types of Network Attacks
#39 2: Network Threats
2.4: Common Network Attacks - Reconnaissance, Access, and Social Engineering
2.4.2: Reconnaissance Attacks
#40 2: Network Threats
2.4: Common Network Attacks - Reconnaissance, Access, and Social Engineering
2.4.3: Video - Reconnaissance Attacks
#41 2: Network Threats
2.4: Common Network Attacks - Reconnaissance, Access, and Social Engineering
2.4.4: Access Attacks
#42 2: Network Threats
2.4: Common Network Attacks - Reconnaissance, Access, and Social Engineering
2.4.5: Video - Access and Social Engineering Attacks
#43 2: Network Threats
2.4: Common Network Attacks - Reconnaissance, Access, and Social Engineering
2.4.6: Social Engineering Attacks
#44 2: Network Threats
2.4: Common Network Attacks - Reconnaissance, Access, and Social Engineering
2.4.6: Social Engineering Attacks (Cont.)
#45 2: Network Threats
2.4: Common Network Attacks - Reconnaissance, Access, and Social Engineering
2.4.7: Strengthening the Weakest Link
#46 2: Network Threats
2.4: Common Network Attacks - Reconnaissance, Access, and Social Engineering
2.4.8: Lab - Social Engineering
#47 2: Network Threats
2.5: Network Attacks - Denial of Service, Buffer Overflows, and Evasion
#48 2: Network Threats
2.5: Network Attacks - Denial of Service, Buffer Overflows, and Evasion
2.5.1: Video - Denial of Service Attacks
#49 2: Network Threats
2.5: Network Attacks - Denial of Service, Buffer Overflows, and Evasion
2.5.2: DoS and DDoS Attacks
#50 2: Network Threats
2.5: Network Attacks - Denial of Service, Buffer Overflows, and Evasion
2.5.3: Components of DDoS Attacks
#51 2: Network Threats
2.5: Network Attacks - Denial of Service, Buffer Overflows, and Evasion
2.5.4: Video - Mirai Botnet
#52 2: Network Threats
2.5: Network Attacks - Denial of Service, Buffer Overflows, and Evasion
2.5.5: Buffer Overflow Attack
#53 2: Network Threats
2.5: Network Attacks - Denial of Service, Buffer Overflows, and Evasion
2.5.6: Evasion Methods
#54 2: Network Threats
2.5: Network Attacks - Denial of Service, Buffer Overflows, and Evasion
2.5.6: Evasion Methods (Cont.)
2.5.7: Check Your Understanding - Identify the Types of Network Attacks