Network Threats#
- Spoofing attack
- Protocol abuse
- Zero-day attack
- ARP cache poisoning
- Denial of service
- Man-in-the-middle attack
- Session hijacking
- Brute force
- Physical-Local Access
- Compromised system
- Insider threat-malicious employee
- VLAN hopping
- Administrative access control
- Malware
- Social Engineering
Common Vulnerabilities#
- Unnecessary Running Services
- Unpatched-Legacy Systems
- Unencrypted Channels
- Cleartext Credentials
- RF Emanation
Hardening Your Network#
- Physical Security
- Network Security
- Device Hardening
- Host Security
Firewalls#
- Types of Firewalls
- Implementing and Configuring Firewalls
- Troubleshooting Firewalls