Network Threats #
- Spoofing attack
- Protocol abuse
- Zero-day attack
- ARP cache poisoning
- Denial of service
- Man-in-the-middle attack
- Session hijacking
- Brute force
- Physical-Local Access
- Compromised system
- Insider threat-malicious employee
- VLAN hopping
- Administrative access control
- Malware
- Social Engineering
Common Vulnerabilities #
- Unnecessary Running Services
- Unpatched-Legacy Systems
- Unencrypted Channels
- Cleartext Credentials
- RF Emanation
Hardening Your Network #
- Physical Security
- Network Security
- Device Hardening
- Host Security
Firewalls #
- Types of Firewalls
- Implementing and Configuring Firewalls
- Troubleshooting Firewalls