Common TCP and UDP Ports – CompTIA A+ 220-901 – 2.4
We use transport-layer protocols to communicate to specific services on a remote device. In this video, you’ll learn about some of the most popular TCP and UDP ports used on our servers.
We use transport-layer protocols to communicate to specific services on a remote device. In this video, you’ll learn about some of the most popular TCP and UDP ports used on our servers.
Network management and security requires a knowledge of TCP and UDP ports. In this video, you’ll learn about some of the most popular TCP and UDP protocols and their corresponding port numbers.
We rely on session identification to manage many aspects of our application use, but an insecure session ID can be a significant security concern. In this video, you’ll learn about browser cookies, session IDs, session hijacking, and header manipulation.
We use a number of algorithms to maintain the security of our data as it flows across the network. In this video, you’ll learn about SSL, SSH, and IPsec encryption protocols.
We have more storage than ever in our data centers. In this video, you’ll learn about NAS, SAN, Fibre Channel, and iSCSI storage technologies.
Without encryption, we would not be able to securely use our network connections. In this videos, you’ll learn how your browser encrypts all of the information you send to a web server using HTTPS or TLS/SSL.
A router is one of the most important devices in your network. In this video, you’ll learn how to securely connect and manage your routers and other infrastructure devices.
Our specialized application protocols make it very easy for us to surf the net, transfer files, and send our email messages. In this video, you’ll learn about common application protocols used by HTTP, IMAP, and VoIP applications.
If you’re looking through pages of protocol decodes or log files, you’ll need a working knowledge of the most popular network port numbers. In this video, you’ll learn about port numbers and you’ll learn the value of the most common port numbers.
We rely on encryption to protect our data across the network. In this video, you’ll learn about HTTPS and how we use TLS/SSL to encrypt our network traffic.