Useful Links
Computer Science
Computer Science Fundamentals
Introduction to Computer Science
1. Foundations of Computer Science
2. Data Representation and Number Systems
3. Computer Hardware and Architecture
4. Software Fundamentals
5. Introduction to Programming
6. Algorithms and Data Structures
7. Computer Networks and Internet
8. Cybersecurity Fundamentals
9. Database Systems
10. Artificial Intelligence and Machine Learning
11. Human-Computer Interaction
12. Ethical and Societal Impacts of Computing
Computer Networks and Internet
Network Fundamentals
Network Definition and Purpose
Network Components
Nodes
Links
Protocols
Network Devices
Network Classification
By Geographic Scope
Personal Area Network (PAN)
Local Area Network (LAN)
Metropolitan Area Network (MAN)
Wide Area Network (WAN)
By Topology
Bus Topology
Star Topology
Ring Topology
Mesh Topology
Hybrid Topologies
By Access Method
Public Networks
Private Networks
Virtual Private Networks
Network Protocols and Standards
Protocol Concepts
Protocol Definition
Protocol Layers
Protocol Standards Organizations
OSI Reference Model
Seven-Layer Model
Layer Functions
Protocol Examples per Layer
TCP/IP Protocol Suite
Internet Protocol (IP)
IP Addressing
IPv4 vs IPv6
Routing Concepts
Transmission Control Protocol (TCP)
Connection-Oriented Communication
Reliability Mechanisms
Flow Control
User Datagram Protocol (UDP)
Connectionless Communication
Speed vs Reliability Trade-offs
Application Layer Protocols
Hypertext Transfer Protocol (HTTP/HTTPS)
File Transfer Protocol (FTP)
Simple Mail Transfer Protocol (SMTP)
Post Office Protocol (POP)
Internet Message Access Protocol (IMAP)
Domain Name System (DNS)
Internet Architecture
Internet vs World Wide Web
Internet Infrastructure
Web as Application Layer
Internet Service Providers
Tier 1 Providers
Tier 2 Providers
Tier 3 Providers
Internet Governance
Internet Corporation for Assigned Names and Numbers (ICANN)
Internet Engineering Task Force (IETF)
World Wide Web Consortium (W3C)
Network Security Basics
Security Threats
Eavesdropping
Data Tampering
Identity Spoofing
Denial of Service
Security Mechanisms
Encryption
Authentication
Access Control
Firewalls
Secure Communication
Secure Sockets Layer (SSL)
Transport Layer Security (TLS)
Virtual Private Networks (VPN)
Previous
6. Algorithms and Data Structures
Go to top
Next
8. Cybersecurity Fundamentals