Tutorial L2 Attacks & Mitigation Techniques