|
| 1 | +# Networking and Protocols |
| 2 | +1. Fundamentals of Networking |
| 3 | + * TCP/IP |
| 4 | + * Protocols |
| 5 | + * Network Adapter |
| 6 | + * Local Area Network (LAN) |
| 7 | + * Wide Area Network (WAN) |
| 8 | + * Peer-to-peer |
| 9 | + * Client-Server |
| 10 | + * Network Topologies |
| 11 | + * Bus |
| 12 | + * Star |
| 13 | + * Ring |
| 14 | + * Token Ring |
| 15 | + * Mesh |
| 16 | + * Full Mesh |
| 17 | + * Hybrid |
| 18 | + * Point-to-multipoint |
| 19 | + |
| 20 | +2. Network Cables and Transmission |
| 21 | + * Network cables |
| 22 | + * coaxial |
| 23 | + * twisted-pair |
| 24 | + * fiber-optic |
| 25 | + * Electro-Magnetic Interference (EMI) |
| 26 | + * Megabits per second (Mbps) |
| 27 | + * Gigabits per second (Gbps) |
| 28 | + * Megabytes per second (MBps) |
| 29 | + * Gigabytes per second (GBps) |
| 30 | + * Baseband |
| 31 | + * Shielded Twisted Pairs (STP) |
| 32 | + * Unshielded Twisted Pairs (UTP) |
| 33 | + * RJ-45 |
| 34 | + * CAT5, 5E, 6 cabling |
| 35 | + * Single-mode |
| 36 | + * Multimode |
| 37 | + * Wave Division Multiplexing (WDM) |
| 38 | + * Multimode Fiber-Optic |
| 39 | + * Wireless Access Point (WAP) |
| 40 | + * Service Set Identifier (SSID) |
| 41 | + * Wireless Frequency Ranges |
| 42 | + * Hertz |
| 43 | + * Data Transmission Methods |
| 44 | + * Baseband |
| 45 | + * Broadband |
| 46 | + * Data signaling methods |
| 47 | + * Digital |
| 48 | + * Analog |
| 49 | + * Half-duplex |
| 50 | + * Full-duplex |
| 51 | + * IEEE 802 |
| 52 | + * IEEE 802.3 |
| 53 | + * IEEE 802.11 |
| 54 | + |
| 55 | +3. Digital / Telecommunications Convergence |
| 56 | + * Transoceanic Cable |
| 57 | + * Digital Signal 1 |
| 58 | + * E-carrier |
| 59 | + * Optical Carrier transmission rates |
| 60 | + * Digital Subscriber Line (DSL) |
| 61 | + * Asymmetric DSL (ADSL) |
| 62 | + * Symmetric DSL (SDSL) |
| 63 | + * Very High Bitrate DSL (VDSL) |
| 64 | + * Asynchronous Transfer Mode |
| 65 | + * Synchronous Optical Network (SONET) |
| 66 | + * Geostationary orbit |
| 67 | + * Elliptical/Non-Geostationary orbit |
| 68 | + * footprint |
| 69 | + * Very Small Aperture Terminal (VSAT) |
| 70 | + * TCP/IP Protocol Suite |
| 71 | + |
| 72 | +4. The OSI and TCP/IP Model |
| 73 | + * International Organization for Standardization (ISO) |
| 74 | + * ISO Model |
| 75 | + * Protocol Data Unit (PDU) |
| 76 | + * Application Programming Interfaces |
| 77 | + |
| 78 | +5. Introduction to Network Devices |
| 79 | + * Network Interface Card (NIC) |
| 80 | + * Repeaters |
| 81 | + * Hubs |
| 82 | + * Switches |
| 83 | + * Routers |
| 84 | + |
| 85 | +6. Addressing |
| 86 | + * Unicast |
| 87 | + * Multicast |
| 88 | + * Broadcast |
| 89 | + * Anycast |
| 90 | + * Media Access Control (MAC) address |
| 91 | + * Organizationally Unique Identifier (OUI) |
| 92 | + * Internet Protocol (IP) address |
| 93 | + * IP Network Part |
| 94 | + * IP Host Part |
| 95 | + * Subnet Mask |
| 96 | + * Classless Interdomain Routing (CIDR) |
| 97 | + * Variable-Length Subnet Masking (VLSM) |
| 98 | + * Subnetting |
| 99 | + * Supernetting |
| 100 | + * IP Classes |
| 101 | + * Private IP ranges |
| 102 | + * Automatic Private IP Addressing (APIPA) |
| 103 | + * Address Resolution Protocol (ARP) |
| 104 | + * ARP cache |
| 105 | + * Reverse Address Resolution Protocol (RARP) |
| 106 | + * IP Broadcast address |
| 107 | + * MAC Broadcast address |
| 108 | + * Network Address Translation (NAT) |
| 109 | + * Static NAT |
| 110 | + * Dynamic NAT |
| 111 | + * Port Address Translation (PAT) |
| 112 | + * Ports |
| 113 | + * Internet Protocol Version 6 (IPv6) |
| 114 | + * Internet Protocol Security (IPsec) |
| 115 | + * Internet Assigned Numbers Authority (IANA) |
| 116 | + * Route Aggregation |
| 117 | + * Dual stacking |
| 118 | + * Translation |
| 119 | + * Tunneling |
| 120 | + * Neighbor Discovery Protocol (NDP) |
| 121 | + |
| 122 | +8. Internet Control Message Protocol (ICMP) |
| 123 | + * Internet Control Message Protocol (ICMP) |
| 124 | + * ICMPv6 |
| 125 | + |
| 126 | +9. Transport Layer Protocols |
| 127 | + * Transmission Control Protocol (TCP) |
| 128 | + * Three-way handshake |
| 129 | + * TCP flags |
| 130 | + * User Datagram Protocol (UDP) |
| 131 | + |
| 132 | +10. Application Layer Protocols |
| 133 | + * Ports |
| 134 | + * Well-Known Ports |
| 135 | + * Registered Ports |
| 136 | + * Ephemeral Ports |
| 137 | + * Socket |
| 138 | + * Dynamic Host Configuration Protocol (DHCP) |
| 139 | + * DORA Process |
| 140 | + * Domain Name System (DNS) |
| 141 | + * Root name servers |
| 142 | + * Top-Level Domains (TLDs) |
| 143 | + * Generic TLD (gTLD) |
| 144 | + * Sponsored TLD (sTLD) |
| 145 | + * Country Code TLD (ccTLD) |
| 146 | + * Brand gTLD |
| 147 | + * Top-Level Domains (TLDs) |
| 148 | + * Fully Qualified Domain Name (FQDN) |
| 149 | + * Absolute domain name |
| 150 | + * DNS Resource Records |
| 151 | + * DNS Queries |
| 152 | + * Iterative |
| 153 | + * Recursive |
| 154 | + * DNS Forwarder |
| 155 | + * DNS Caching |
| 156 | + * Zone Transfers |
| 157 | + * Simple Mail Transport Protocol (SMTP) |
| 158 | + * Post Office Protocol version 3 (POP3) |
| 159 | + * Internet Message Access Protocol version 4 (IMAP4) |
| 160 | + * Hypertext Transfer Protocol (HTTP) |
| 161 | + * Uniform Resource Locator (URL) |
| 162 | + * Hypertext Transfer Protocol Secure (HTTPS) |
| 163 | + * Secure Sockets Layer (SSL) |
| 164 | + * Transport Layer Security (TLS) |
| 165 | + * File Transfer Protocol (FTP) |
| 166 | + * Active Mode |
| 167 | + * Passive Mode |
| 168 | + * Secure Shell (SSH) |
| 169 | + * Diffie-Hellman key exchange |
| 170 | + * Lightweight Directory Access Protocol (LDAP) |
| 171 | +11. Specialty Networks |
| 172 | + * Supervisory Control and Data Acquisition (SCADA) |
| 173 | + * Virtual Local Area Network (VLAN) |
| 174 | + * Virtual Private Network (VPN) |
| 175 | +12. Cloud Computing |
| 176 | + * Cloud |
| 177 | + * Amazon Web Services (AWS) |
| 178 | + * Azure |
| 179 | + * Google Cloud |
| 180 | + * IBM Cloud |
| 181 | + * Digital Ocean |
| 182 | + * Public Cloud |
| 183 | + * Private Cloud |
| 184 | + * Community Cloud |
| 185 | + * Hybrid Cloud |
| 186 | + * Software as a Service (SaaS) |
| 187 | + * Platform as a Service (PaaS) |
| 188 | + * Infrastructure as a Service (IaaS) |
| 189 | +13. Information and Data Security |
| 190 | + * CIA Triad |
| 191 | + * Information Assurance (IA) |
| 192 | +14. Network Security |
| 193 | + * Network security |
| 194 | + * Network Threats |
| 195 | + * Uninterruptible power supply (UPS) |
| 196 | + * Redundant array of inexpensive disks (RAID) |
| 197 | + * Physical Access |
| 198 | + * Logical Access |
| 199 | + * Remote Access |
| 200 | + * Malicious Software (Malware) |
| 201 | + * Virus |
| 202 | + * Worm |
| 203 | + * Trojan |
| 204 | + * Rootkit |
| 205 | + * Bootkit |
| 206 | + * Adware |
| 207 | + * Spyware |
| 208 | + * Ransomware |
| 209 | + * Social Engineering |
| 210 | + * Phishing |
| 211 | + * Spear Phishing |
| 212 | + * Whaling |
| 213 | + * Denial of Service (DoS) |
| 214 | + * Distributed Denial of Service (DDoS) |
| 215 | + * Firewalls |
| 216 | + * Host-based |
| 217 | + * Network-based |
| 218 | + * Intrusion Detection Systems (IDS) |
| 219 | + * Host-based |
| 220 | + * Network-based |
| 221 | + * Intrusion prevention systems (IPS) |
0 commit comments