Network Security
This module explores the core principles of network security, focusing on first principles and hardware constraints to build world-class, production-ready expertise. We delve into how physical hardware limits dictate security protocol design, from the CPU cycles required for asymmetric encryption to the memory table constraints that make stateful firewalls vulnerable to exhaustion.
Module Chapters
Chapter 01
TLS/SSL Handshake
TLS/SSL Handshake
Start Learning
Chapter 02
Firewalls and IDS
Firewalls and IDS
Start Learning
Chapter 03
VPN and Tunneling
VPN and Tunneling
Start Learning
Chapter 04
DoS and DDoS Attacks
DoS and DDoS Attacks
Start Learning
Chapter 05
Network Access Control
Network Access Control
Start Learning
Chapter 06
Module Review: Security
Module Review: Security
Start Learning