Description
This is the first (out of five) session in the Networking and Cyber Security course. In this session we will
explore and understand the TCP/IP model, protocols and processes using a real TCP/IP walkthrough scenario.
We will investigate the security features in the infrastructure protocols from the viewpoint of an attacker. We will use many examples and real life demos.
Objectives
After you complete this course you will be able to identify, recognize and understand the components of the TCP/IP model.
Inaddition, you will have a deep understanding of the vulnerabilities and weaknesses in the tcp/ip infrastructure protocols.