Networking

"In cybersecurity, networks are more than cables and packets — they are veins carrying trust through machines."


Networking is the process of connecting computers, devices, and systems to share data and resources efficiently. In this section you are going to know about different networking topics in-depth to protect yourself from treats.


I have created structured path for best learning experience, it's only for whom who actually want to make there network safe and secure.
I hope you will find somthing new ...

  1. 1. Fundamentals of Networking
    1. 1.1 Data communication basics
    2. 1.2 OSI vs TCP/IP Model
    3. 1.3 IP Addressing & Subnetting
    4. 1.4 MAC Addressing & ARP
    5. 1.5 DNS and Domain Resolution
    6. 1.6 NAT, PAT, and Port Forwarding
    7. 1.7 DHCP Mechanism
    8. 1.8 ICMP and Ping/Traceroute
    9. 1.9 VLANs and Trunking
    10. 1.10 Routing Basics
      1. 1.10.1 Static Routing
      2. 1.10.2 Dynamic Routing Protocols
      3. 1.10.3 Routing Tables and Metrics
  2. 2. Networking Protocols (TCP/IP Suite)
    1. 2.1 Application Layer Protocols
      1. 2.1.1 HTTP/HTTPS
      2. 2.1.2 FTP/SFTP
      3. 2.1.3 SSH
      4. 2.1.4 SMTP/POP3/IMAP
      5. 2.1.5 Telnet
      6. 2.1.6 SNMP
      7. 2.1.7 NTP
      8. 2.1.8 DNS
    2. 2.2 Transport Layer Protocols
      1. 2.2.1 TCP - Handshake & Flags
      2. 2.2.2 UDP
      3. 2.2.3 TCP Retransmission, Windowing, Congestion Control
    3. 2.3 Network Layer Protocols
      1. 2.3.1 IP (IPv4 and IPv6)
      2. 2.3.2 ICMP
      3. 2.3.3 GRE, IPSec, and Tunneling
  3. 3. Network Devices & Infrastructure
    1. 3.1 Routers, Switches, Firewalls
    2. 3.2 Access Points and Wireless Controllers
    3. 3.3 Load Balancers
    4. 3.4 Proxy Servers and NAT Devices
    5. 3.5 IDS/IPS Systems
    6. 3.6 Network Tap, SPAN Port
    7. 3.7 VPN Gateways
  4. 4. Network Security Concepts
    1. 4.1 Defense in Depth
    2. 4.2 Zero Trust Networking
    3. 4.3 Firewalls (Stateless vs Stateful)
    4. 4.4 IDS/IPS (Signature vs Anomaly)
    5. 4.5 Network Segmentation and Isolation
    6. 4.6 VPNs and Tunneling Protocols
    7. 4.7 Secure Protocols vs Insecure Protocols
    8. 4.8 Port Security and MAC Filtering
    9. 4.9 Network ACLs and Filtering Rules
  5. 5. Network Threats and Attacks
    1. 5.1 Reconnaissance & Scanning
      1. 5.1.1 Ping Sweep
      2. 5.1.2 Port Scanning (SYN, FIN, Xmas, Null)
      3. 5.1.3 Banner Grabbing
      4. 5.1.4 OS Fingerprinting
    2. 5.2 MITM Attacks
      1. 5.2.1 ARP Spoofing
      2. 5.2.2 DNS Spoofing
      3. 5.2.3 SSL Stripping
    3. 5.3 DoS and DDoS Attacks
      1. 5.3.1 SYN Flood
      2. 5.3.2 UDP Flood
      3. 5.3.3 ICMP Flood
      4. 5.3.4 Application Layer DoS
    4. 5.4 Packet Sniffing and Eavesdropping
    5. 5.5 Rogue DHCP, Rogue AP Attacks
    6. 5.6 VLAN Hopping
    7. 5.7 MAC Flooding and CAM Table Overflow
    8. 5.8 DNS Amplification
  6. 6. Wireless Networking Security
    1. 6.1 Wireless Standards (802.11a/b/g/n/ac/ax)
    2. 6.2 WPA2/WPA3 Encryption
    3. 6.3 SSID Cloaking and Broadcasting
    4. 6.4 Wireless Attacks
      1. 6.4.1 Deauthentication Attack
      2. 6.4.2 Evil Twin AP
      3. 6.4.3 WPA Handshake Capture
      4. 6.4.4 WPS Pin Brute Force
  7. 7. Network Monitoring and Logging
    1. 7.1 Packet Capture and Analysis (Wireshark, tcpdump)
    2. 7.2 NetFlow and sFlow
    3. 7.3 SNMP Monitoring
    4. 7.4 Syslog Architecture
    5. 7.5 Network Performance Monitoring Tools
    6. 7.6 Log Correlation and Analysis
  8. 8. Protocol & Traffic Analysis Tools
    1. 8.1 Wireshark
    2. 8.2 Tshark and Tcpdump
    3. 8.3 Nmap and Zenmap
    4. 8.4 Netcat & Socat
    5. 8.5 Hping3
    6. 8.6 Scapy
    7. 8.7 Ettercap
    8. 8.8 Burp Suite (for HTTP/S Proxy Traffic)
  9. 9. Secure Network Design
    1. 9.1 DMZ Configuration
    2. 9.2 Bastion Hosts
    3. 9.3 VPN Design and Endpoint Security
    4. 9.4 Network Segmentation
    5. 9.5 Honeypots and Honeynets
    6. 9.6 Redundant Network Design
    7. 9.7 Failover Mechanisms (HA, VRRP, HSRP)
  10. 10. Network Security Tools and Suites
    1. 10.1 IDS/IPS: Snort, Suricata, Zeek
    2. 10.2 Firewalls: iptables, pfSense, Cisco ASA
    3. 10.3 SIEM Tools: Splunk, ELK Stack
    4. 10.4 Vulnerability Scanners: Nessus, OpenVAS
    5. 10.5 Pen Testing Suites: Kali Linux, Parrot OS
    6. 10.6 Network Hardening Tools: Lynis, CIS-CAT
  11. 11. Advanced Topics
    1. 11.1 SDN and Network Virtualization
    2. 11.2 Cloud Networking and Security
    3. 11.3 IPv6 Security Concerns
    4. 11.4 Encrypted DNS (DNS over HTTPS/TLS)
    5. 11.5 Network Automation and Ansible
    6. 11.6 Red Team Network Attacks
    7. 11.7 Blue Team Detection and Response

📞 Contact Us

We're always here to help!

© 2024 cyberuniversity.tech. All rights reserved.Term of service, Privacy Policy