Video Description

Now that you've learned about how the hardware functions and about logical addressing, we look at what happens at layer 3, and how IP works. We'll discuss the most exploited Protocol and how that happens. You'll learn about mapping traffic to see what type of traffic comes in and how much traffic goes out and why that's important, and we'll examine pings, define how spoofing works and mitigating strategies for these types of attacks.

Course Modules

CISSP Archive (10 Domain - 2014)

CISSP 2015 Domain Restructuring