Network Attacks
Introduction In this lesson, you will learn about the various threats that an attacker can launch against a … Read More
Introduction In this lesson, you will learn about the various threats that an attacker can launch against a … Read More
This very comprehensive iOS App Development Course explores developing applications for iOS based devices such as iPhone, iPod … Read More
Threats to cybersecurity originate from three sources: (1) local threats, (2) national threats, and (3) international threats. According … Read More
A computer worm “is a self-replicating virus that does not alter files but resides in active memory and … Read More
Cyberbullying is defined as “intentional, aggressive behavior toward another person that is performed through electronic means (i.e., computers, … Read More
Encryption is the obfuscation that is fast when you know the secret but very slow when you don’t. … Read More
A virus is a “small software program designed to spread from one computer to another and to interfere … Read More
Introduction This lesson will cover remote access and how to better secure data transmissions. Remote access methods describe … Read More
Introduction This lesson will cover IP address management and a topic everybody loves, subnetting. There will be information … Read More
Introduction In this lesson you will learn about aspects of routing and switching when configuring a network. The … Read More
Wireless Security and Vulnerabilities There are several encryption protocols that are used to protect network access: Wired Equivalency … Read More
Introduction In this lesson you will learn about Wide-Area Network (WAN) technology, digital vs. analog signal transmission, circuit-switched … Read More