Did you know Cybrary's video training is FREE? Join more than 2,500,000 IT and cyber security professionals, students, career changers, and more, growing their careers on Cybrary.
Common Threats, vulnerabilities and mitigation techniques This lesson covers common threats, vulnerabilities and mitigation techniques. One of the wireless threats is WAR driving. WAR driving is when someone drives around looking for an unsecured WiFi network with the intention of breaking in to access confidential and important information. This can be prevented via strong wireless security such as using strong wireless encryption on networks. Another threat is WEP/WPA cracking. This is when weaknesses in the encryption key could allow cracking into WiFi.
Module 1.1 - OSI and TCP/IP Models
Module 1.2 - Devices & Protocols in Relation to OSI Model
Module 1.5 and 1.6
Module 3.1 and 3.2
System Analyst and Administrator at SAIC
Subscribe to become an Insider Pro and get access to premium content such as: