From the course: ISC2 Systems Security Certified Practitioner (SSCP) (2024) Cert Prep
Unlock this course with a free trial
Join today to access over 24,900 courses taught by industry experts.
Maintaining network availability
From the course: ISC2 Systems Security Certified Practitioner (SSCP) (2024) Cert Prep
Maintaining network availability
- [Instructor] Sometimes, attackers try to undermine network security by denying legitimate users access to the network. Let's take a look at some techniques that you can implement to defend your network against these attacks. Many denial of service attacks rely upon flooding devices with traffic until they're overwhelmed. One example of this type of attack is the SYN flood. In a SYN flood attack, the attacker creates thousands of partially open TCP connections to a device by sending SYN packets but never answering the SYN-ACK packet to complete the three-way handshake. This is one example of flooding, and there are many similar attacks in the hacker's toolkit. Another example, MAC flooding occurs when attackers send large numbers of different MAC addresses to a switch, hoping to overflow the switch's MAC address table and cause it to forget where devices are and then flood traffic out to every switch port allowing the…
Practice while you learn with exercise files
Download the files the instructor uses to teach the course. Follow along and learn by watching, listening and practicing.
Contents
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- (Locked) Restricting network access2m 11s
- (Locked) Network access control4m 36s
- (Locked) RADIUS and TACACS3m 41s
- (Locked) Firewall rule management4m 15s
- (Locked) Router configuration security4m 10s
- (Locked) Switch configuration security3m 48s
- (Locked) Maintaining network availability2m 34s
- (Locked) Network monitoring3m 45s
- (Locked) SNMP2m 58s
- (Locked) Isolating sensitive systems2m 1s
- (Locked)
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-