Network Security and Defense

  1. Foundational Networking Concepts
    1. OSI Reference Model
      1. Physical Layer
        1. Transmission Media Types
          1. Signal Encoding Methods
            1. Physical Topology Considerations
              1. Cable Standards and Specifications
              2. Network Layer
                1. IP Addressing Fundamentals
                  1. Routing Protocols and Algorithms
                    1. Subnetting and VLSM
                      1. Network Address Translation
                      2. Transport Layer
                        1. TCP Connection Management
                          1. UDP Datagram Services
                            1. Port Numbers and Socket Programming
                              1. Flow Control Mechanisms
                                1. Congestion Control
                                2. Session Layer
                                  1. Session Establishment Procedures
                                    1. Session Maintenance
                                      1. Session Termination
                                        1. Checkpointing and Recovery
                                        2. Presentation Layer
                                          1. Data Encoding Standards
                                            1. Compression Algorithms
                                              1. Encryption Services
                                                1. Character Set Translation
                                                2. Application Layer
                                                  1. Application Protocol Design
                                                    1. Service Interfaces
                                                      1. User Application Integration
                                                    2. TCP/IP Protocol Suite
                                                      1. Network Interface Layer
                                                        1. Ethernet Standards
                                                          1. Wireless Communication Protocols
                                                            1. Frame Relay
                                                              1. ATM Technology
                                                              2. Internet Layer
                                                                1. IPv4 Protocol Structure
                                                                  1. IPv6 Protocol Features
                                                                    1. ICMP Functions
                                                                      1. Routing Protocol Categories
                                                                      2. Transport Layer
                                                                        1. TCP Reliability Features
                                                                          1. UDP Efficiency Characteristics
                                                                            1. Port Allocation
                                                                              1. Connection State Management
                                                                              2. Application Layer
                                                                                1. HTTP and HTTPS Protocols
                                                                                  1. FTP and SFTP Services
                                                                                    1. SMTP and Email Protocols
                                                                                      1. DNS Resolution Services
                                                                                    2. Essential Network Protocols
                                                                                      1. Internet Protocol
                                                                                        1. IPv4 Header Structure
                                                                                          1. IPv4 Addressing Classes
                                                                                            1. IPv6 Header Format
                                                                                              1. IPv6 Address Types
                                                                                                1. IP Fragmentation
                                                                                                2. Transmission Control Protocol
                                                                                                  1. Three-Way Handshake Process
                                                                                                    1. Sequence Number Management
                                                                                                      1. Acknowledgment Mechanisms
                                                                                                        1. Window Size Control
                                                                                                          1. Connection Termination
                                                                                                          2. User Datagram Protocol
                                                                                                            1. Connectionless Communication Model
                                                                                                              1. UDP Header Structure
                                                                                                                1. Application Use Cases
                                                                                                                  1. Performance Characteristics
                                                                                                                  2. Hypertext Transfer Protocol
                                                                                                                    1. HTTP Request Methods
                                                                                                                      1. HTTP Response Codes
                                                                                                                        1. HTTPS Security Implementation
                                                                                                                          1. SSL/TLS Integration
                                                                                                                          2. Domain Name System
                                                                                                                            1. DNS Hierarchy Structure
                                                                                                                              1. Name Resolution Process
                                                                                                                                1. DNS Record Types
                                                                                                                                  1. DNS Security Vulnerabilities
                                                                                                                                  2. Dynamic Host Configuration Protocol
                                                                                                                                    1. DHCP Lease Process
                                                                                                                                      1. DHCP Options Configuration
                                                                                                                                        1. DHCP Security Risks
                                                                                                                                          1. DHCP Relay Agents
                                                                                                                                          2. Internet Control Message Protocol
                                                                                                                                            1. ICMP Message Types
                                                                                                                                              1. Network Diagnostic Functions
                                                                                                                                                1. ICMP-Based Attack Vectors
                                                                                                                                                  1. ICMPv6 Features
                                                                                                                                                  2. Address Resolution Protocol
                                                                                                                                                    1. ARP Request and Reply Process
                                                                                                                                                      1. ARP Table Management
                                                                                                                                                        1. ARP Spoofing Attacks
                                                                                                                                                          1. Gratuitous ARP
                                                                                                                                                        2. Network Infrastructure Components
                                                                                                                                                          1. Routers
                                                                                                                                                            1. Routing Table Management
                                                                                                                                                              1. Packet Forwarding Process
                                                                                                                                                                1. Router Security Features
                                                                                                                                                                  1. Access Control Lists
                                                                                                                                                                  2. Switches
                                                                                                                                                                    1. Layer 2 Switching Operations
                                                                                                                                                                      1. MAC Address Learning
                                                                                                                                                                        1. VLAN Implementation
                                                                                                                                                                          1. Spanning Tree Protocol
                                                                                                                                                                          2. Hubs
                                                                                                                                                                            1. Collision Domain Characteristics
                                                                                                                                                                              1. Broadcast Domain Limitations
                                                                                                                                                                                1. Security Vulnerabilities
                                                                                                                                                                                  1. Legacy Network Considerations
                                                                                                                                                                                  2. Bridges
                                                                                                                                                                                    1. Network Segmentation Functions
                                                                                                                                                                                      1. Bridge Learning Process
                                                                                                                                                                                        1. Transparent Bridging
                                                                                                                                                                                        2. Network Interface Cards
                                                                                                                                                                                          1. Wired NIC Features
                                                                                                                                                                                            1. Wireless NIC Capabilities
                                                                                                                                                                                              1. Promiscuous Mode Operation
                                                                                                                                                                                                1. Driver Security Considerations