Introduction to intrusion tactics
The case for securing networks
Let's start by answering the question, why do we need secure networks? As you've learned,...
Matt: A professional on dealing with attacks
My name's Matt, I'm a chaos specialist at Google. They let us choose our own job titles to be...
Denial of Service (DoS) attacks
Welcome back. In this video, we're going to discuss denial of service attacks. A denial...
Read tcpdump logs
A network protocol analyzer, sometimes called a packet sniffer or a packet analyzer, is a tool de...
Real-life DDoS attack
Previously, you were introduced to Denial of Service (DoS) attacks. You also learned that volumet...
Malicious packet sniffing
In this video, we'll discuss packet sniffing, with a focus on how threat actors may use...
IP Spoofing
Next, let's learn about another kind of network attack called IP spoofing. IP spoofing ...
Overview of interception tactics
In the previous course items, you learned how packet sniffing and IP spoofing are used in network...
Glossary terms from week 3 & wrap-up
Nice job finishing this section! Let's review what you've learned so far. We discussed ...