This video offers a description of system log files, which are files that are targeted in Phase 5 of the typical hacking methodology. In step 1.9 you were introduced to …
This video describes how scareware works and shares examples of these attacks. In previous videos, we reviewed how hackers can use social engineering to target you. To review social engineering, …
This video shares a practical demonstration of Sophos Home antivirus software. Sophos Home is one example of antivirus software that is available. When assessing what software package you want to …
In this video, you will learn about the importance of antivirus protection. Viruses can gain access to your device through physical devices or through emails or websites. Even the most …
This video addresses the importance of patches and the cycle one should use to ensure all patches are updated to ensure the network is secure. Keeping software updated is an …
In this video you will learn about the importance of having structures in place for employees to report questions or incidences of suspicious activity. The goal of network security is …
This video describes the considerations needed to balance ease of use for users of the network and the level of security and restrictions necessary to protect the network. A network’s …
In this video, you will learn about the value of employee training to increase awareness around network threats. It is important that all users of your network understand that they …
This video gives a deeper explanation of what an insider threat is and how to mitigate these threats. You have already heard insider threats mentioned in previous videos. Security often …
This video explains how you can use the IP address of a hacker to track their location. In previous videos, we discussed DNS leaks and what you can do to …
This video goes through how to test whether you have a domain name server (DNS) leak that exposes your IP address. When you access the internet and your DNS is …
This video explains what a virtual private network (VPN) is and how it protects the privacy of users’ data. A VPN can protect your network by providing a secure, encrypted …
This video explains why it is important to keep all applications up to date to enhance security, and it warns against neglecting updates for unused applications. In previous videos, we …
This video explains the importance of limiting users’ rights on a network and the considerations needed to allocate access rights. You have already learned about the importance of educating network …
In this video, you will learn how to protect your network from the types of physical attacks reviewed in the previous videos. Physical attacks to your network can cause a …