24 Results Found
A mobile phone is just like a small computer, that can be hacked. Learn basic mobile phone security practices to lock down this potential entry point to your corporate systems.
A firewall is a security tool which may be a hardware or software solution that is used to filter network traffic. Understand the basic functionality of a firewall where traffic is blocked or allowed to enter the network.
An incident is an event that could lead to loss of, or disruption to, an organization's operations, services or functions. Understand how an incident response team prepares, plans, and responds to a security breach.
The goal of risk management is to reduce risk down to an acceptable or tolerable level. Understand countermeasures, safeguards, and security controls that can be selected to eliminate or reduce risk.
Networks are under attack as hackers try to access systems to compromise or steal sensitive data and information. Understand the threats posed by malware, ransomware and social engineering.
A brief introduction to the basics of penetration testing.
Instructor John Harmon explains subnetting using binary numbers and decimal conversions.
Instructor John Harmon continues his explanation of subnetting by showing how subnet masks can be used to sub-divide networks.
There are several Wireless LAN Standards, including b, g, and n, which exist in the 2.4 GHz band. These standards need around 20 MHz of radio frequency in order to transmit their signals. In this video, Ben Miller discusses how to pick access points and channels for optimal performance.
The driver behind 802.11n is MIMO, or multiple input multiple output. This video explains how MIMO works to double your channel speed by sending two or more data streams over the same channel.