Home / Computer

Computer

Network Attacks

Network Attacks | Types | How to Prevent

Introduction In this lesson, you will learn about the various threats that an attacker can launch against a network. Attacks on a specific protocol or service are attempts to take advantage of a specific feature or to use the protocol or service in a way that was not intended. You …

Read More »

IOS App Development Course for Beginners

IOS App Development Course for Beginners | Online Free

This very comprehensive iOS App Development Course explores developing applications for iOS based devices such as iPhone, iPod Touch and iPad. This free online course will provide an overview of iOS development from use of current iOS SDK, to design of applications and industry business practices. Prior programming experience in …

Read More »

Linux Tutorials for Beginners

Linux Tutorials for Beginners | Linux Online Course

This very comprehensive Linux online course covers the following tutorials for beginners: Introduction to Linux Operating System. Linux Installation, Basic Administration, Utilities And Commands, Upgrading, And Application Installation. Introduction to Scripting, Data Management, User Interfaces and Desktops, Essential System Services, Networking Fundamentals, Security And How They Function In Linux. Lesson …

Read More »

Types of Cybersecurity Threats

Types of Cybersecurity Threats

Threats to cybersecurity originate from three sources: (1) local threats, (2) national threats, and (3) international threats. According to the Department of Homeland Security (DHS), a cyberthreat “refers to persons who attempt unauthorized access to a control system device and/or network using a data communications pathway.” Cyber threats originate mainly from …

Read More »

What Is A Computer Worm & How Does It Work?

What Is A Computer Worm, And How Does It Work?

A computer worm “is a self-replicating virus that does not alter files but resides in active memory and duplicates itself.” Worms live and replicate within the operating system that is invisible to the computer user. Users typically encounter the worms when their computer starts to slow down substantially due to the …

Read More »

What is Cyberbullying? Types & Examples

What is Cyberbullying? Types & Examples

Cyberbullying is defined as “intentional, aggressive behavior toward another person that is performed through electronic means (i.e., computers, cell phones, PDAs).”  Cyberbullying, similar to traditional bullying, takes place within a larger group or community. Often, students are victimized in front of their entire class or school. Cyberbullying has similar negative …

Read More »

What Is Encryption & How Does It Work?

What Is Encryption & How Does It Work

Encryption is the obfuscation that is fast when you know the secret but very slow when you don’t. Encryption of data is still the most effective way to protect it from being stolen. It is also called cryptography. Even though the NSA has the capability to crack encrypted data, it is …

Read More »

What is a Computer Virus? Types & Risks

What is a Computer Virus? Types & Risks

A virus is a “small software program designed to spread from one computer to another and to interfere with computer operation.” A virus is a code that will duplicate itself into a host program when it is activated. Every company has at least one employee who will click on anything and …

Read More »

Secure Remote Access and Network Protection

Secure Remote Access and Network Protection

Introduction This lesson will cover remote access and how to better secure data transmissions. Remote access methods describe how a client connects to the local area network (LAN) remotely. In order for the client to access the LAN, they have to be authenticated through a remote access server. Network protection …

Read More »

IP Address Management & Subnetting- CompTIA Network+

IP Address Management & Subnetting- CompTIA Network+

Introduction This lesson will cover IP address management and a topic everybody loves, subnetting. There will be information in this lesson that will help identify network and host portions of an IP address. Lastly, this lesson will explain how to calculate the number of host and subnets needed on a …

Read More »

How to Install and Configure Routers and Switches

How to Install and Configure Routers and Switches

Introduction In this lesson you will learn about aspects of routing and switching when configuring a network. The options and features discussed provide for effective management of a local area network (LAN). Lesson Objectives By the end of this lesson, you will be able to: Identifying the steps involved with …

Read More »

Wireless Security Vulnerabilities and Mitigation

Wireless Security Vulnerabilities and Mitigations

Wireless Security and Vulnerabilities There are several encryption protocols that are used to protect network access: Wired Equivalency Privacy (WEP), WI – FI Protected Access (WPA), and Wireless Protected Access 2 (WPA2). 1. Wired Equivalency Privacy (WEP) is an encryption protocol the uses a 64 0r 128 bit encryption key …

Read More »

Wide Area Network (WAN) Technologies- CompTIA Network+

Wide Area Network (WAN) Technologies- CompTIA Network+

Introduction In this lesson you will learn about Wide-Area Network (WAN) technology, digital vs. analog signal transmission, circuit-switched and packet-switched networks. You will also be introduced to multiprotocol label switching and its application in a networked environment. Lesson Objectives By the end of this lesson, you will be able to: …

Read More »

What is Network Security- CompTIA Network+

What is Network Security- CompTIA Network+

Introduction In this lesson you will learn about how to secure networks from unauthorized individuals. Several different methods for achieving security will be discussed. A network administrator should be concerned whether or not the “right” people have access to the network. Lesson Objectives By the end of this lesson, you …

Read More »

Host to Host Communication- CompTIA Network+

Host to Host Communication- CompTIA Network+

Introduction This article will introduce how computers and other hosts communicate internally and externally. A discussion of how data travels from the host, to the media will introduce dependent topics which should give an in-depth view of host communication. Lesson Objectives By the end of this lesson, you will be …

Read More »