training
Networking and the TCP/IP model

Description
This is the first (out of five) session in the Networking and Cyber Security course. In this session we will explore and understand the TCP/IP model, protocols and processes using a real TCP/IP walkthrough scenario. We will investigate the security features in the infrastructure protocols from the viewpoint of an attacker. We will use many examples and real life demos.

Objectives
After you complete this course you will be able to identify, recognize and understand the components of the TCP/IP model. Inaddition, you will have a deep understanding of the vulnerabilities and weaknesses in the tcp/ip infrastructure protocols.

Duration
1 day

Outline

Basic TCP/IP Networking
The TCP/IP model
TCP/IP walkthrough end-to-end case study
Ethernet, ARP and RARP
IP and ICMP
TCP and UDP
DNS, DHCP, HTTP and HTTPS

Protocols and security
Security features in the TCP/IP model
Bottom-up exploration
Authentication and encryption

Networking processes
Behind the scenes of network processes
DHCP - joining the network
NAT - address translation
DNS - name resolution


© Brainstorm Private Consulting. All Rights Reserved
Designed By : Template World