Join Mike Chapple for an in-depth discussion in this video Maintaining network availability, part of CompTIA Security+ (SY0-401) Cert Prep: Network Security.
- Sometimes attackers try to undermine network security…by denying legitimate users access to the network.…Let's take a look at two techniques you can implement…to defend your network against availability-based attacks.…Many denial of service attacks rely upon flooding devices…with traffic until they are overwhelmed.…I cover many of these…in the Security Plus Threats and Vulnerabilities course.…One example of this type of attack is the SYN Flood.…You may recall that in a SYN Flood attack,…the attacker creates thousands…of partially opened TCP connections to a device…by sending SYN packets…but never answering the SYN ACK packet…to complete the three-way handshake.…
This is one example of flooding,…and there are many similar attacks…in the attacker's toolkit.…Another example, MAC Flooding, occurs…when attackers send large numbers of different MAC addresses…to a switch, hoping to overflow…the switch's MAC address table…and cause it forget where devices are…and then, flood traffic out to every switch port,…allowing the attacker to eavesdrop…
Author
Released
1/26/2016We are now a CompTIA Content Publishing Partner. As such, we are able to offer CompTIA exam vouchers at a 10% discount. For more information on how to obtain this discount, please download these PDF instructions.
- Working with the TCP/IP suite
- Securing switches and routers
- Configuring firewalls
- Setting up virtual private networks (VPNs)
- Detecting and preventing network intrusions
- Implementing unified threat management
- Using public and private network addressing effectively
- Subnetting
- Segmenting networks
- Virtualization and cloud computing
- Managing secure networks
Skill Level Intermediate
Duration
Views
Related Courses
-
Introduction
-
Welcome54s
-
-
1. TCP/IP Suite
-
Introducing TCP/IP5m 20s
-
IP addresses3m 26s
-
Domain Name Service4m 6s
-
Network ports3m 42s
-
ICMP3m 29s
-
-
2. Network Security Devices
-
Switches and routers2m 31s
-
Firewalls4m 17s
-
VPNs and VPN concentrators2m 55s
-
Protocol analyzers6m 39s
-
Unified threat management1m 54s
-
-
3. Designing Secure Networks
-
Subnetting3m 46s
-
Network access control4m 22s
-
Remote network access5m 18s
-
Telephony2m 24s
-
Defense in depth3m 26s
-
4. Cloud Computing and Virtualization
-
Virtualization4m 20s
-
Cloud computing models3m 44s
-
Public cloud tiers5m 35s
-
-
5. Managing Secure Networks
-
Firewall rule management4m 41s
-
Network monitoring4m 19s
-
SNMP3m 18s
-
Storage networks3m 8s
-
-
Conclusion
-
Next steps28s
-
- Mark as unwatched
- Mark all as unwatched
Are you sure you want to mark all the videos in this course as unwatched?
This will not affect your course history, your reports, or your certificates of completion for this course.
CancelTake notes with your new membership!
Type in the entry box, then click Enter to save your note.
1:30Press on any video thumbnail to jump immediately to the timecode shown.
Notes are saved with you account but can also be exported as plain text, MS Word, PDF, Google Doc, or Evernote.
Share this video
Embed this video
Video: Maintaining network availability