We use transport-layer protocols to communicate to specific services on a remote device. In this video, you’ll learn about some of the most popular TCP and UDP ports used on our servers.
Network management and security requires a knowledge of TCP and UDP ports. In this video, you’ll learn about some of the most popular TCP and UDP protocols and their corresponding port numbers.
If you have the right information, it may be possible to gain access to a user’s account information without any authentication. In this video, you’ll learn about session hijacking and I’ll demonstrate a live session hijack by gaining access to cookie information and manipulating HTTP headers.
Our specialized application protocols make it very easy for us to surf the net, transfer files, and send our email messages. In this video, you’ll learn about common application protocols used by HTTP, IMAP, and VoIP applications.
If you’re looking through pages of protocol decodes or log files, you’ll need a working knowledge of the most popular network port numbers. In this video, you’ll learn about port numbers and you’ll learn the value of the most common port numbers.
The TCP and UDP protocols use ports to associate application communication between devices. In this video, you’ll get an overview of ports and you’ll learn which ports are most commonly found on the network.