INTRODUCTION
Malware and its Types
CIA Triad
TYPES OF ATTACKS
Social Engineering
Types of Social Engineering Attacks
Why does Social Engineering works?
Denial of Service
Man In The Middle
Buffer Overflow
Injection attacks
Cross Site Scripting
ARP Poisoning
DNS Poisoning
Privilege Escalation
Amplification Attack
Man In The Browser Attack
Zero Day Attack
Replay Attack
Pass the Hash
Hijacking Attacks
Shimming and Refactoring
MAC and IP spoofing
Wireless Attacks
Cryptographic Attacks Types
Cryptographic Attacks Details
Birthday
Known plain textcipher text
Rainbow tables
Dictionary
Brute force
Collision
downgrade
Replay
Weak Implementations
Threat actor and their types
Penetration Testing
Penetration Testing vs Vulnerability Scanning
Vulnerability Scanning
Vulnerabilities Types & Impacts
Firewall & its Types
VPN Virtual Private Network
NIPS - Network Intrusion Prevention System | NIDS - Network Intrusion Detection System
Router
Switch
Proxy & its Types
Load balancer
Access Point
SIEM Security Information and Event Management
DLP Data Loss Prevention
NAC Network Access Control
Mail Gateway
Advanced Network Technologies Bridge, SSLTLS Accelerators, Decryptors, Media Gateway, HSM
Protocol Analyzer
Network Scanners
Wireless Scanners
Password Crackers
Vulnerability Scanner
Configuration compliance scanner
Exploitation frameworks
Data sanitization tools
Steganography Tools
Honeypot
Backup Utilities
Banner Grabbing
Passive Vs Active
Command Line Tools Ping
Command Line Tools Netstat
Command Line Tools Tracert
Command Line Tools Nslookup & Dig
Command Line Tools Arp
Command Line Tools Ipconfig ip ifconfig
Command Line Tools Tcpdump
Command Line Tools Nmap
Command Line Tools Netcat
Resloving Unencrypted Credentials Clear Text
Resolving Logs And Events Anomalies
Resolving Permission Issues
Resolving Access Violations
Resolving Certificate Issues
Resolving Data Exfiltration
Resolving Misconfigured Devices Firewall, Content Filter, Access Points
Resolving Weak Security Configurations
Resolving Personnel Issues Policy Violation Insider Threat Social Engineering Social Media Personal Email
Resolving Unauthorized Software
Resolving Baseline Deviationv
Resolving License Compliance Violation Availability Integrity
Resolving Asset Management
Resolving Authentication Issues
Analyzing And Interpreting Hids Hips
Analyzing And Interpreting Antivirus
Analyzing And Interpreting File Integrity Check
Analyzing And Interpreting Hostbased Firewall
Analyzing And Interpreting Application Whitelisting
Analyzing And Interpreting Removable Media Control
Analyzing And Interpreting Advanced Malware Tools
Analyzing And Interpreting Patch Management Tools
Analyzing And Interpreting UTM
Analyzing And Interpreting DLP
Analyzing And Interpreting Data Execution Prevention
Analyzing And Interpreting Web Application Firewall
Cellular Connections
WiFi
Satcom
Bluetooth
NFC
ANT
Infrared
USB
Mobile Device Management Concepts
Application Management
Content Management
Remote Wipe
Geofencing Geolocation And Gps Tagging
Asset Tracking And Inventory Control
Screen Locks
Push Notification Services
Passwords And Pins
Biometrics
Context Aware Authentication
Containerization
Storage Segmentation
Full Device Encryption
SHREE LEARNING ACADEMY
Toggle Menu
Home
Tutorial
Quiz
Advanced Network Technologies Quiz
What has largely replaced traditional network bridges in modern networks?
A) Hubs
B) Firewalls
C) Routers
D) Switches
Why is disabling IP forwarding important in a system with multiple network interfaces?
A) To enable IPv6 adoption
B) To conserve IP addresses
C) To speed up data transmission
D) To prevent security risks
Which of the following mechanisms help maintain IPv4 in parts of a network or connect to IPv4-only ISPs?
A) Media gateways
B) HSMs
C) IPv4-to-IPv6 tunnels, proxies, or bridges
D) SSL/TLS Accelerators
What is the primary role of SSL/TLS Accelerators?
A) Storing encryption keys securely
B) Speeding up and securing SSL/TLS encryption
C) Monitoring encrypted traffic
D) Converting data between different formats
Which device is commonly found on computer motherboards and provides whole-drive encryption?
A) Media Gateway
B) Hardware Security Module (HSM)
C) Trusted Platform Module (TPM)
D) SSL/TLS Decryptor
Submit answers
Your Score:
Go To Website's Tutorial Page
Read Tutorial
Watch our Video Tutorial