ic_menu_white
Created with Sketch.
How Networks Really Work
Network Security Fallacies
Fallacies of Distributed Computing
Network Security Fallacies
An Overview of Networking Challenges
The Importance of Networking Layers
Network Addressing
Switching, Routing and Bridging
Routing Protocols
Advanced Routing Protocol Topics
Fast Failover
Slide Decks
Textbooks and Other Books You Should Read
Even More Interesting Reading
Root Causes
Root Causes
Address and Session Hijacking
Router Impersonation Attacks
VLAN and Encapsulation Attacks
IP Source Routing Attacks
Spoofing Source IP Addresses
Unidirectional and Amplification Attacks
Insecure Tunnels and Other Data Plane Attacks
Control-Plane Denial-of-Service Attacks
Routing Attacks
History of BGP Route Leaks
Hacking BGP for Fun and Profit
Disruptions Caused by BGP Bugs
The Way Forward
23.02.02A - ZTNA Overview
23.02.02B - Microsegmentation in Zero-Trust World
23.02.02C - Zero-Trust Solutions
Your browser doesn't support embedded videos.
Download it here
.
Root Causes
Do you want to mark this video completed?
Next video:
Address and Session Hijacking