Useful Links
Computer Science
Cybersecurity
Network Security and Defense
1. Introduction to Network Security
2. Foundational Networking Concepts
3. Threat Landscape Analysis
4. Network Perimeter Security
5. Secure Network Design and Architecture
6. Securing Network Communications
7. Wireless Network Security
8. Access Control and Authentication
9. Network Monitoring and Incident Response
10. Security Policies and Compliance
11. Advanced and Emerging Topics
Threat Landscape Analysis
Threat Actor Categories
Hacktivists
Political and Social Motivations
Common Attack Methods
Target Selection Criteria
Impact Assessment
Cybercriminals
Financial Motivation Factors
Organized Crime Networks
Monetization Strategies
Underground Economy
Nation-State Actors
Espionage Objectives
Sabotage Capabilities
Advanced Persistent Threats
Geopolitical Implications
Insider Threats
Malicious Insider Characteristics
Unintentional Insider Risks
Privilege Abuse Scenarios
Detection Challenges
Script Kiddies
Automated Tool Usage
Skill Level Limitations
Opportunistic Targeting
Nuisance Factor Assessment
Network Attack Classifications
Reconnaissance Attacks
Port Scanning Techniques
TCP Connect Scans
SYN Stealth Scans
UDP Scans
Scan Detection Methods
Network Enumeration
Service Identification
Version Detection
Operating System Fingerprinting
Packet Sniffing Operations
Passive Network Monitoring
Protocol Analysis
Credential Harvesting
Host Discovery Methods
Ping Sweeps
ARP Scanning
DNS Zone Transfers
Access Attacks
Password-Based Attacks
Brute Force Techniques
Dictionary Attack Methods
Rainbow Table Attacks
Credential Stuffing Operations
Trust Exploitation
Trusted Relationship Abuse
Privilege Escalation
Lateral Movement Techniques
Man-in-the-Middle Attacks
Session Hijacking Methods
SSL Stripping
ARP Poisoning
DNS Spoofing
Denial-of-Service Attacks
Network Layer DoS
SYN Flood Attacks
ICMP Flood Attacks
IP Fragment Attacks
Application Layer DoS
HTTP Flood Attacks
Slowloris Attacks
Application-Specific Exploits
Distributed Denial-of-Service Attacks
Botnet Infrastructure
Bot Recruitment Methods
Command and Control Systems
Botnet Monetization
Amplification Attacks
DNS Amplification
NTP Amplification
SSDP Amplification
Multi-Vector Attacks
Combined Attack Strategies
Attack Coordination
Malware Categories
Computer Viruses
Infection Mechanisms
Payload Delivery
Replication Strategies
Detection Evasion
Network Worms
Self-Propagation Methods
Network Scanning Techniques
Vulnerability Exploitation
Payload Distribution
Trojan Horses
Backdoor Implementation
Remote Access Capabilities
Data Exfiltration Functions
Persistence Mechanisms
Ransomware
Encryption-Based Ransomware
Screen Locker Ransomware
Payment Systems
Recovery Challenges
Spyware
Keystroke Logging
Screen Capture
Data Theft Operations
Privacy Violations
Adware
Advertisement Injection
Browser Hijacking
Revenue Generation Models
Rootkits
Kernel-Level Rootkits
User-Mode Rootkits
Bootkit Technology
Detection Challenges
Social Engineering Techniques
Phishing Attacks
Email-Based Phishing
Website Spoofing
Credential Harvesting
Malware Distribution
Spear Phishing
Target Research Methods
Personalized Attack Vectors
Advanced Evasion Techniques
Voice Phishing
Telephone-Based Attacks
Caller ID Spoofing
Social Manipulation
SMS Phishing
Text Message Attacks
Mobile Device Targeting
Link Redirection
Baiting Techniques
Physical Media Baiting
Digital Baiting Methods
Curiosity Exploitation
Pretexting
Identity Impersonation
Authority Exploitation
Information Gathering
Previous
2. Foundational Networking Concepts
Go to top
Next
4. Network Perimeter Security