Networks are susceptible to many different types of attacks, including the denial-of-service attacks and eavesdropping attacks discussed in earlier videos. In this video, learn the details of advanced networking attacks, including the Christmas tree attack, DNS and ARP poisoning, and typosquatting.
- [Instructor] Networks are susceptible…to many different types of attack.…In the last video, you saw how eavesdropping…attacks might compromise the network…to listen in on, and tamper with communications.…Now, let's move on to the details of…advanced networking attacks, including the Christmas…Tree attack, DNS and ARP Poisoning, and Typosquatting.…Packets are the basic unit of network communications.…Each time you request a web page, send an email…or transfer other information over the network,…it's divided up into small packets of information…that are then reassembled at the receiving system.…
Packets carry a data payload, but…also must include header information.…You can think of a packet header as…the envelope that carries the data.…It includes information like the…source and destination addresses.…Headers also include flags.…These are single bit fields that…contain either a one or a zero.…If a field flag is set to one, it indicates…a special purpose packet, for example,…the SYN flag is used to set up a new connection.…
Note: This course is part of a series releasing throughout 2018. A completed learning path of the series will be available once all the courses are released.
- How IP addresses are assigned and managed
- Multilayer protocols
- VPNs and VPN concentrators
- Designing secure networks
- Firewall management techniques
- Maintaining network availability
- Software defined networking (SDN)
- Port isolation
- Network attacks
- How Wi-Fi networks function
- WPA, WPS, and propagation attacks
- Host-based network security control
Skill Level Advanced
Insights from a Cybersecurity Professionalwith Mike Chapple32m 15s Appropriate for all
1. TCP/IP Networking
2. Network Security Devices
3. Designing Secure Networks
4. Specialized Networking
5. Secure Network Management
6. Virtualized Networks
Port isolation1m 47s
7. Network Attacks
8. Transport Encryption
9. Wireless Networking
10. Host Security
- Mark as unwatched
- Mark all as unwatched
Are you sure you want to mark all the videos in this course as unwatched?
This will not affect your course history, your reports, or your certificates of completion for this course.Cancel
Take notes with your new membership!
Type in the entry box, then click Enter to save your note.
1:30Press on any video thumbnail to jump immediately to the timecode shown.
Notes are saved with you account but can also be exported as plain text, MS Word, PDF, Google Doc, or Evernote.