Useful Links
Computer Science
Cybersecurity
Network Security and Defense
1. Introduction to Network Security
2. Foundational Networking Concepts
3. Threat Landscape Analysis
4. Network Perimeter Security
5. Secure Network Design and Architecture
6. Securing Network Communications
7. Wireless Network Security
8. Access Control and Authentication
9. Network Monitoring and Incident Response
10. Security Policies and Compliance
11. Advanced and Emerging Topics
Foundational Networking Concepts
OSI Reference Model
Physical Layer
Transmission Media Types
Signal Encoding Methods
Physical Topology Considerations
Cable Standards and Specifications
Data Link Layer
MAC Addressing Schemes
Frame Structure and Format
Error Detection Mechanisms
Error Correction Techniques
Switching Functions
Network Layer
IP Addressing Fundamentals
Routing Protocols and Algorithms
Subnetting and VLSM
Network Address Translation
Transport Layer
TCP Connection Management
UDP Datagram Services
Port Numbers and Socket Programming
Flow Control Mechanisms
Congestion Control
Session Layer
Session Establishment Procedures
Session Maintenance
Session Termination
Checkpointing and Recovery
Presentation Layer
Data Encoding Standards
Compression Algorithms
Encryption Services
Character Set Translation
Application Layer
Application Protocol Design
Service Interfaces
User Application Integration
TCP/IP Protocol Suite
Network Interface Layer
Ethernet Standards
Wireless Communication Protocols
Frame Relay
ATM Technology
Internet Layer
IPv4 Protocol Structure
IPv6 Protocol Features
ICMP Functions
Routing Protocol Categories
Transport Layer
TCP Reliability Features
UDP Efficiency Characteristics
Port Allocation
Connection State Management
Application Layer
HTTP and HTTPS Protocols
FTP and SFTP Services
SMTP and Email Protocols
DNS Resolution Services
Essential Network Protocols
Internet Protocol
IPv4 Header Structure
IPv4 Addressing Classes
IPv6 Header Format
IPv6 Address Types
IP Fragmentation
Transmission Control Protocol
Three-Way Handshake Process
Sequence Number Management
Acknowledgment Mechanisms
Window Size Control
Connection Termination
User Datagram Protocol
Connectionless Communication Model
UDP Header Structure
Application Use Cases
Performance Characteristics
Hypertext Transfer Protocol
HTTP Request Methods
HTTP Response Codes
HTTPS Security Implementation
SSL/TLS Integration
Domain Name System
DNS Hierarchy Structure
Name Resolution Process
DNS Record Types
DNS Security Vulnerabilities
Dynamic Host Configuration Protocol
DHCP Lease Process
DHCP Options Configuration
DHCP Security Risks
DHCP Relay Agents
Internet Control Message Protocol
ICMP Message Types
Network Diagnostic Functions
ICMP-Based Attack Vectors
ICMPv6 Features
Address Resolution Protocol
ARP Request and Reply Process
ARP Table Management
ARP Spoofing Attacks
Gratuitous ARP
Network Infrastructure Components
Routers
Routing Table Management
Packet Forwarding Process
Router Security Features
Access Control Lists
Switches
Layer 2 Switching Operations
MAC Address Learning
VLAN Implementation
Spanning Tree Protocol
Hubs
Collision Domain Characteristics
Broadcast Domain Limitations
Security Vulnerabilities
Legacy Network Considerations
Bridges
Network Segmentation Functions
Bridge Learning Process
Transparent Bridging
Network Interface Cards
Wired NIC Features
Wireless NIC Capabilities
Promiscuous Mode Operation
Driver Security Considerations
Previous
1. Introduction to Network Security
Go to top
Next
3. Threat Landscape Analysis