The TCP/IP protocol suite is the backbone of modern networks. In this video, you’ll learn how these fundamental protocols are used on today’s global Internet.
If you want to really understand what’s happening on the network, you’ll need a good protocol analyzer. In this video, you’ll learn why protocol analyzers play such an important role in network security.
There are a number of tools that can help you discover threats and vulnerabilities on your network. In this video, you’ll learn about protocol analyzers, vulnerability scanners, port scanners, and honeypots.
When you start your computer at work, your laptop doesn’t configure itself with a valid IP address. Which protocol is responsible for configuring your IP address?
Which protocol can turn the name of a web site into an IP address?
What protocol is used to encrypt the connection between a client and a server over a terminal connection?
The TCP and UDP protocols use ports to associate application communication between devices. In this video, you’ll get an overview of ports and you’ll learn which ports are most commonly found on the network.
The fundamental languages used over our computer networks are a standard set of protocols that are used around the world. In this video, you’ll learn about protocols and the set of standards associated with TCP/IP. You’ll also learn the essentials of TCP/IP and how subnetting can be used to build today’s modern networks.
In the last mini-training course lesson, we learned about the different methods of gathering the network traffic created during our Nmap scans. In this lesson, we’ll go through our trace file and see exactly what happens when Nmap hits the network.