Search icon CANCEL
Subscription
0
Cart icon
Your Cart (0 item)
Close icon
You have no products in your basket yet
Arrow left icon
Explore Products
Best Sellers
New Releases
Books
Videos
Audiobooks
Learning Hub
Conferences
Free Learning
Arrow right icon
Arrow up icon
GO TO TOP
CompTIA Network+ N10-008 Certification Guide - Second Edition

You're reading from   CompTIA Network+ N10-008 Certification Guide - Second Edition The ultimate guide to passing the N10-008 exam

Arrow left icon
Product type Paperback
Published in Nov 2022
Publisher Packt
ISBN-13 9781803236063
Length 692 pages
Edition 2nd Edition
Arrow right icon
Author (1):
Arrow left icon
Glen D. Singh Glen D. Singh
Author Profile Icon Glen D. Singh
Glen D. Singh
Arrow right icon
View More author details
Toc

Table of Contents (26) Chapters Close

Preface 1. Part 1: Networking Concepts
2. Chapter 1: Exploring the OSI Model and TCP/IP FREE CHAPTER 3. Chapter 2: Network Topologies and Connections 4. Chapter 3: Ethernet Technology and Virtualization 5. Chapter 4: Understanding IPv4 and IPv6 Addressing 6. Chapter 5: Applied IPv4 Subnetting 7. Chapter 6: Exploring Network Protocols and Services 8. Chapter 7: Data Center Architecture and Cloud Computing 9. Part 2: Network Implementation
10. Chapter 8: Networking Devices 11. Chapter 9: Routing and Switching Concepts 12. Chapter 10: Exploring Wireless Standards and Technologies 13. Part 3: Network Operations
14. Chapter 11: Assuring Network Availability 15. Chapter 12: Organizational Documents and Policies 16. Chapter 13: High Availability and Disaster Recovery 17. Part 4: Network Security and Troubleshooting
18. Chapter 14: Network Security Concepts 19. Chapter 15: Exploring Cyberattacks and Threats 20. Chapter 16: Implementing Network Security 21. Chapter 17: Network Troubleshooting 22. Chapter 18: Practice Exam 23. Assessments 24. Index 25. Other Books You May Enjoy

Exploring network-based attacks

Threat actors such as hackers always look for security vulnerabilities in the systems and networks of their targets. A seasoned hacker will attempt to compromise the low-hanging fruits, as these are the security flaws that are easy to exploit on a system and do not require too much complexity in setting up the attack. Quite often, many people think security vulnerabilities are found only on applications and operating systems, but not on the network and its protocols. In the early days of the internet, many networking protocols were not designed with security features since it was not a concern as it is in today’s world. Many of these unsecure network protocols make up the Transmission Control Protocol/Internet Protocol (TCP/IP) networking model, which is implemented on every device that’s connected to a network. Therefore, the TCP/IP networking model contains a lot of vulnerabilities that can easily be exploited by hackers on a network...

lock icon The rest of the chapter is locked
Register for a free Packt account to unlock a world of extra content!
A free Packt account unlocks extra newsletters, articles, discounted offers, and much more. Start advancing your knowledge today.
Unlock this book and the full library FREE for 7 days
Get unlimited access to 7000+ expert-authored eBooks and videos courses covering every tech area you can think of
Renews at $19.99/month. Cancel anytime
Banner background image