In this learning activity, you’ll identify information hackers use to gain access to a company, explain different types of social engineering attacks, and recognize different solutions to avoid these attacks.
Explore Intrusion Detection Systems, what they are, how they're configured, and the types of protection the provide.
In this learning activity you'll explore why the FTP protocol is often used to transfer data across the network and more importantly, why it should not be.
In this learning activity you'll explore what a denial of service attack is and learn how a single hacker can take down an entire system.
In this learning activity you'll explore how port scanning is commonly used by hackers to infiltrate a network and how IT security professionals can detect it.