Course 3 resources and citations
Week 1: Network architecture
Resources
Helpful resources to get started
Citations
Network components, devices, and diagrams
-
Meyers, Mike, and Scott Jernigan. (2019) CompTIA A+ Certification All-in-One Exam Guide, (Exams 220-1001 & 220-1002).
-
Oluwatosin, H.S. (2014). Client-server model. IOSR Journal of Computer Engineering, 16(1), 67-71.
-
Sulyman, Shakirat. (2014). Client-Server Model. IOSR Journal of Computer Engineering. 16. 57-71. 10.9790/0661-16195771.
-
GeeksforGeeks. (2022, March 21). Devices used in each layer of TCP/IP model
Cloud computing and software-defined networks
-
Rackspace Technology Colo Data Centers. (n.d.). What is colocation?
-
-
Fortinet. (n.d.). What is hybrid cloud?
Learn more about the TCP/IP model
-
Clarke, Glen E. (2018). CompTIA Network+ Certification Study Guide: Exam N10-007.
-
International Business Machines. (2022, Nov 15). User datagram protocol
-
.
-
International Business Machines. (2022, Nov 15). Transmission control protocol
-
.
-
Oracle. (n.d.). TCP/IP protocol architecture model
-
. System administration guide, volume 3.
-
Study CCNA. (n.d.). OSI & TCP/IP models
-
.
-
Cloudflare. (n.d.). What is the OSI model?
-
-
FreeCodeCamp. (2020, December 21). The OSI Model – The 7 Layers of Networking Explained in Plain English
-
.
-
Imperva. (n.d.). OSI Model
-
. Application security.
Components of network layer communication
-
Agnė Srėbaliūtė. (2022, Aug 2). IPv4 packet header: Format and structure
-
. IPXO.
-
Rajinder Kaur (2009) IPv4 Header
-
. Advanced Internet Technologies.
-
Gsephrioth. (2017). The IP diagram
-
.
-
Wright, Robert. (October 1998). IP Routing Primer. O’Reilly.
Week 2: Network operations
Citations
-
National Institute of Standards and Technology. (n.d.). Glossary
-
. Accessed December 2022.
-
Cloudflare. (n.d.). What is a protocol? | Network protocol definition
-
.
-
CompTIA. (n.d.). What is a network protocol and how does it work?
-
-
Oracle. (n.d.). TCP/IP protocol architecture model
-
. System administration guide, volume 3.
-
IBM. (2022, Oct 17). TCP/IP address and parameter assignment - Dynamic host configuration protocol
-
. IBM AIX documentation.
-
Microsoft. (n.d.O). What are IMAP and POP?
-
Microsoft Support.
-
Microsoft. (2013, October 21). SMTP
-
.
The evolution of wireless security protocols
-
Asus. (2022, January 14). [Wireless] What is WPA3? What are the advantages of using WPA3?
-
FAQ.
-
Britannica, T. Editors of Encyclopaedia (2022, February 3). Wi-Fi
-
. Encyclopedia Britannica.
-
Cisco Press. (2010, April 9). Moving to WPA/WPA2-Enterprise wi-fi encryption
-
.
Firewalls and network security measures
-
Cisco. (n.d.). What is a firewall?
-
Cloudflare. (n.d.). What is a subnet?
-
-
Techopedia. (2017, July 18). Subnetting
-
. Dictionary.
-
IP Address Guide. (n.d.). CIDR to IPv4 Conversion
-
. IPV4 Tools.
-
National Institute of Standards and Technology. (n.d.). Glossary
-
. Accessed December 2022.
Week 3: Secure against network intrusions
Resources
Citations
The case for securing networks
-
Vinton, Kate. (2014, September 18). With 56 million cards compromised, Home Depot’s breach is bigger than Target’s
-
. Forbes.
Analyze network layer communication
-
Lager, Nathan. (2020, April 3). Network Troubleshooting with Packet Captures
-
. Enable Sysadmin.
-
Oracle. (n.d.) How the TCP/IP Protocols Handle Data Communications (System Administration Guide: IP Services
-
).
-
Olenick, D. (2020, December 10) Guilty plea in 2016 Dyn DDos attack
-
. Bank info security.
-
Young, K (2022, January 10) Cyber case study: The Mirai DDoS attack on Dyn
-
. Coverlink.
Overview of interception attacks
-
Engebretson, P. (2013). The basics of hacking and penetration testing: ethical hacking and penetration testing made easy. Elsevier.
Week 4: Security hardening
Resources
Citations
-
National Institute of Security Technology. (2018, October). Guide to securing macOS 10.12 systems for IT professionals
-
. Special publication 800-179, revision 1. Accessed December 2022.
-
Doropoulos, N. (n.d.). DNS Query Flood Attack.
-
Linkedin.
Use the NIST Cybersecurity Framework to respond to a security
-
Bhardwaj, P. (2023, January 2). How to detect an ICMP flood attack and protect your network.
Firch, J. (2023, February 28). How to prevent a ICMP flood attack.
Google, Android, Chronicle, Google Drive, Google Sites, and YARA are trademarks owned by Google LLC. All other trademarks belong to their respective owners and are not affiliated with Google LLC.
No Comments