Skip to main content

Course 3 resources and citations


Week 1: Network architecture

Resources

Helpful resources to get started

 

  •  

Citations

Network components, devices, and diagrams

 

  • Meyers, Mike, and Scott Jernigan. (2019) CompTIA A+ Certification All-in-One Exam Guide, (Exams 220-1001 & 220-1002).

  • Oluwatosin, H.S. (2014). Client-server model. IOSR Journal of Computer Engineering, 16(1), 67-71.

  • Sulyman, Shakirat. (2014). Client-Server Model. IOSR Journal of Computer Engineering. 16. 57-71. 10.9790/0661-16195771. 

  • GeeksforGeeks. (2022, March 21). Devices used in each layer of TCP/IP model

. 

  •  

Cloud computing and software-defined networks

 

  •  

Learn more about the TCP/IP model

 

  • .

The OSI model

 

  • . Application security.  

Components of network layer communication

 

  • .

  • Wright, Robert. (October 1998). IP Routing Primer. O’Reilly.

Week 2: Network operations

Citations

Network protocols

 

  • National Institute of Standards and Technology. (n.d.). Glossary

  • . Accessed December 2022.

Common network protocols

 

  • . System administration guide, volume 3.

Additional network protocols 

 

The evolution of wireless security protocols

 

  • .  

Firewalls and network security measures 

 

  •  

Subnetting and CIDR

 

  • . IPV4 Tools.

Proxy servers

 

  • National Institute of Standards and Technology. (n.d.). Glossary

  • . Accessed December 2022.

Week 3: Secure against network intrusions

Resources

Analyze network attacks

 

  •  

Citations

The case for securing networks 

 

  • . Forbes. 

Analyze network layer communication

 

  • ).

Real-life DDoS attack

 

  • . Coverlink.

Overview of interception attacks

 

  • Engebretson, P. (2013). The basics of hacking and penetration testing: ethical hacking and penetration testing made easy. Elsevier.

Week 4: Security hardening

Resources

Course 3 glossary 

 

Apply OS hardening techniques

 

  •  

Citations

OS hardening practices 

 

  • . Special publication 800-179, revision 1. Accessed December 2022.

Apply OS hardening techniques

 

  • Linkedin.

Use the NIST Cybersecurity Framework to respond to a security

 

  •  

 

Firch, J. (2023, February 28). How to prevent a ICMP flood attack.

 

 

Google, Android, Chronicle, Google Drive, Google Sites, and YARA are trademarks owned by Google LLC.  All other trademarks belong to their respective owners and are not affiliated with Google LLC.