Understanding networks and protocols is essential to understanding network security. In this course, you will review your knowledge of the OSI model—how protocols work and where network devices operate in relation to protocols. You will learn about the main phases of hacking, discovery, scanning, enumeration, and vulnerability scanning. You will also begin to see how important it is to gain an understanding of your own IT infrastructure's weaknesses in order to design a proper security policy.
A strong foundation in basic networking concepts
A solid understanding of TCP/IP protocols and how they work
James Michael Stewart
Michael has over 30 years experience with computers and technology with a focus on security, certification, and various operating systems. He has been teaching job skills and certification courses on topics like CISSP, ethical hacking and penetration testing, computer forensics, and Security Plus for over 20 years. He is also the primary author of two books and holds a variety of certifications including CISSP, CEH, CHFI, ECSA, and Security Plus.