# Course 3 resources and citations

#   


# Week 1: Network architecture

## Resources

[Helpful resources to get started<svg aria-labelledby="cds-react-aria-631-title" class="css-1lzqdox" fill="none" focusable="false" height="16" id="bkmrk--1" role="img" viewbox="0 0 16 16" width="16"></svg>](https://www.coursera.org/learn/automate-cybersecurity-tasks-with-python/supplement/u8Np0/helpful-resources-to-get-started)

- [Coursera Code of Conduct<svg aria-labelledby="cds-react-aria-632-title" class="css-1lzqdox" fill="none" focusable="false" height="16" id="bkmrk--2" role="img" viewbox="0 0 16 16" width="16"></svg>](https://www.coursera.support/s/article/208280036-Coursera-Code-of-Conduct?language=en_US)
- 
- [Coursera Honor Code<svg aria-labelledby="cds-react-aria-633-title" class="css-1lzqdox" fill="none" focusable="false" height="16" id="bkmrk--3" role="img" viewbox="0 0 16 16" width="16"></svg>](https://www.coursera.support/s/article/209818863-Coursera-Honor-Code?language=en_US)
- 
- [Coursera: Edit my profile<svg aria-labelledby="cds-react-aria-634-title" class="css-1lzqdox" fill="none" focusable="false" height="16" id="bkmrk--4" role="img" viewbox="0 0 16 16" width="16"></svg>](https://www.coursera.org/account-profile)
- 
- [Coursera: Learner Help Center<svg aria-labelledby="cds-react-aria-635-title" class="css-1lzqdox" fill="none" focusable="false" height="16" id="bkmrk--5" role="img" viewbox="0 0 16 16" width="16"></svg>](https://learner.coursera.help/hc/en-us)
- 
- [Coursera’s Global Online Community<svg aria-labelledby="cds-react-aria-636-title" class="css-1lzqdox" fill="none" focusable="false" height="16" id="bkmrk--6" role="img" viewbox="0 0 16 16" width="16"></svg>](https://www.coursera.support/s/community?language=en_US)
- 
- [Google: Common problems with labs<svg aria-labelledby="cds-react-aria-637-title" class="css-1lzqdox" fill="none" focusable="false" height="16" id="bkmrk--7" role="img" viewbox="0 0 16 16" width="16"></svg>](https://support.google.com/qwiklabs/answer/9133560?hl=en&ref_topic=9134804)
- 
- [Google Docs help<svg aria-labelledby="cds-react-aria-638-title" class="css-1lzqdox" fill="none" focusable="false" height="16" id="bkmrk--8" role="img" viewbox="0 0 16 16" width="16"></svg>](https://support.google.com/docs/topic/9046002?hl=en&ref_topic=1382883)
- 
- [Google Sheets help<svg aria-labelledby="cds-react-aria-639-title" class="css-1lzqdox" fill="none" focusable="false" height="16" id="bkmrk--9" role="img" viewbox="0 0 16 16" width="16"></svg>](https://support.google.com/docs/topic/9054603?hl=en&ref_topic=1382883)
- 
- [How to use Google Slides<svg aria-labelledby="cds-react-aria-640-title" class="css-1lzqdox" fill="none" focusable="false" height="16" id="bkmrk--10" role="img" viewbox="0 0 16 16" width="16"></svg>](https://support.google.com/docs/answer/2763168?hl=en&co=GENIE.Platform%3DDesktop)
- 
- [Microsoft Excel help and learning<svg aria-labelledby="cds-react-aria-641-title" class="css-1lzqdox" fill="none" focusable="false" height="16" id="bkmrk--11" role="img" viewbox="0 0 16 16" width="16"></svg>](https://support.microsoft.com/en-us/excel)
- 
- [PowerPoint help and learning<svg aria-labelledby="cds-react-aria-642-title" class="css-1lzqdox" fill="none" focusable="false" height="16" id="bkmrk--12" role="img" viewbox="0 0 16 16" width="16"></svg>](https://support.microsoft.com/en-us/powerpoint)
- 
- [Word help and learning<svg aria-labelledby="cds-react-aria-643-title" class="css-1lzqdox" fill="none" focusable="false" height="16" id="bkmrk--13" role="img" viewbox="0 0 16 16" width="16"></svg>](https://support.microsoft.com/en-us/word)

- 

## Citations

[Network components, devices, and diagrams<svg aria-labelledby="cds-react-aria-644-title" class="css-1lzqdox" fill="none" focusable="false" height="16" id="bkmrk--14" role="img" viewbox="0 0 16 16" width="16"></svg>](https://www.coursera.org/learn/networks-and-network-security/supplement/AdErf/network-components-devices-and-diagrams)

- Meyers, Mike, and Scott Jernigan. (2019) CompTIA A+ Certification All-in-One Exam Guide, (Exams 220-1001 &amp; 220-1002).
- Oluwatosin, H.S. (2014). Client-server model. *IOSR Journal of Computer Engineering*, *16*(1), 67-71.
- Sulyman, Shakirat. (2014). Client-Server Model. IOSR Journal of Computer Engineering. 16. 57-71. 10.9790/0661-16195771.
- GeeksforGeeks. (2022, March 21). [*Devices used in each layer of TCP/IP model*<svg aria-labelledby="cds-react-aria-645-title" class="css-1lzqdox" fill="none" focusable="false" height="16" id="bkmrk--15" role="img" viewbox="0 0 16 16" width="16"></svg>](https://www.geeksforgeeks.org/devices-used-in-each-layer-of-tcp-ip-model/)

*.*[ <svg aria-labelledby="cds-react-aria-646-title" class="css-1lzqdox" fill="none" focusable="false" height="16" id="bkmrk--16" role="img" viewbox="0 0 16 16" width="16"></svg>](https://www.geeksforgeeks.org/devices-used-in-each-layer-of-tcp-ip-model/)

- 

[Cloud computing and software-defined networks<svg aria-labelledby="cds-react-aria-647-title" class="css-1lzqdox" fill="none" focusable="false" height="16" id="bkmrk--17" role="img" viewbox="0 0 16 16" width="16"></svg>](https://www.coursera.org/learn/networks-and-network-security/supplement/kNUaM/cloud-computing-and-software-defined-networks)

- Rackspace Technology Colo Data Centers. (n.d.). [*What is colocation?*<svg aria-labelledby="cds-react-aria-648-title" class="css-1lzqdox" fill="none" focusable="false" height="16" id="bkmrk--18" role="img" viewbox="0 0 16 16" width="16"></svg>](https://www.rackspace.com/library/what-is-colocation)
- 
- Fortinet. (n.d.). [*What is hybrid cloud?*<svg aria-labelledby="cds-react-aria-649-title" class="css-1lzqdox" fill="none" focusable="false" height="16" id="bkmrk--19" role="img" viewbox="0 0 16 16" width="16"></svg>](https://www.fortinet.com/resources/cyberglossary/what-is-hybrid-cloud)

- 

[Learn more about the TCP/IP model<svg aria-labelledby="cds-react-aria-650-title" class="css-1lzqdox" fill="none" focusable="false" height="16" id="bkmrk--20" role="img" viewbox="0 0 16 16" width="16"></svg>](https://www.coursera.org/learn/networks-and-network-security/supplement/SXl0z/review-of-the-tcp-ip-model)

- Clarke, Glen E. (2018). CompTIA Network+ Certification Study Guide: Exam N10-007.
- International Business Machines. (2022, Nov 15). [*User datagram protocol*<svg aria-labelledby="cds-react-aria-651-title" class="css-1lzqdox" fill="none" focusable="false" height="16" id="bkmrk--21" role="img" viewbox="0 0 16 16" width="16"></svg>](https://www.ibm.com/docs/en/aix/7.2?topic=protocols-user-datagram-protocol)
- *.*
- International Business Machines. (2022, Nov 15). [*Transmission control protocol*<svg aria-labelledby="cds-react-aria-652-title" class="css-1lzqdox" fill="none" focusable="false" height="16" id="bkmrk--22" role="img" viewbox="0 0 16 16" width="16"></svg>](https://www.ibm.com/docs/en/aix/7.2?topic=protocols-transmission-control-protocol)
- *.*
- Oracle. (n.d.). [*TCP/IP protocol architecture model*<svg aria-labelledby="cds-react-aria-653-title" class="css-1lzqdox" fill="none" focusable="false" height="16" id="bkmrk--23" role="img" viewbox="0 0 16 16" width="16"></svg>](https://docs.oracle.com/cd/E19683-01/806-4075/ipov-10/index.html)
- *.* System administration guide, volume 3.
- Study CCNA. (n.d.). [*OSI &amp; TCP/IP models*<svg aria-labelledby="cds-react-aria-654-title" class="css-1lzqdox" fill="none" focusable="false" height="16" id="bkmrk--24" role="img" viewbox="0 0 16 16" width="16"></svg>](https://study-ccna.com/osi-tcp-ip-models/)

- *.*

[The OSI model<svg aria-labelledby="cds-react-aria-655-title" class="css-1lzqdox" fill="none" focusable="false" height="16" id="bkmrk--25" role="img" viewbox="0 0 16 16" width="16"></svg>](https://www.coursera.org/learn/networks-and-network-security/supplement/YbKL0/the-osi-model-explained)

- Cloudflare. (n.d.). [*What is the OSI model?*<svg aria-labelledby="cds-react-aria-656-title" class="css-1lzqdox" fill="none" focusable="false" height="16" id="bkmrk--26" role="img" viewbox="0 0 16 16" width="16"></svg>](https://www.cloudflare.com/learning/ddos/glossary/open-systems-interconnection-model-osi/)
- 
- FreeCodeCamp. (2020, December 21). [*The OSI Model – The 7 Layers of Networking Explained in Plain English*<svg aria-labelledby="cds-react-aria-657-title" class="css-1lzqdox" fill="none" focusable="false" height="16" id="bkmrk--27" role="img" viewbox="0 0 16 16" width="16"></svg>](https://www.freecodecamp.org/news/osi-model-networking-layers-explained-in-plain-english/)
- .
- Imperva. (n.d.). [*OSI Model*<svg aria-labelledby="cds-react-aria-658-title" class="css-1lzqdox" fill="none" focusable="false" height="16" id="bkmrk--28" role="img" viewbox="0 0 16 16" width="16"></svg>](https://www.imperva.com/learn/application-security/osi-model/#:~:text=The%20session%20layer%20creates%20communication,closing%20them%20when%20communication%20ends)

- *.* Application security.

[Components of network layer communication<svg aria-labelledby="cds-react-aria-659-title" class="css-1lzqdox" fill="none" focusable="false" height="16" id="bkmrk--29" role="img" viewbox="0 0 16 16" width="16"></svg>](https://www.coursera.org/learn/networks-and-network-security/supplement/IRnxH/components-of-network-layer-communication)

- Agnė Srėbaliūtė. (2022, Aug 2). [*IPv4 packet header: Format and structure*<svg aria-labelledby="cds-react-aria-660-title" class="css-1lzqdox" fill="none" focusable="false" height="16" id="bkmrk--30" role="img" viewbox="0 0 16 16" width="16"></svg>](https://www.ipxo.com/blog/ipv4-packet-header/)
- . IPXO.
- Rajinder Kaur (2009) [*IPv4 Header*<svg aria-labelledby="cds-react-aria-661-title" class="css-1lzqdox" fill="none" focusable="false" height="16" id="bkmrk--31" role="img" viewbox="0 0 16 16" width="16"></svg>](https://advancedinternettechnologies.wordpress.com/ipv4-header/)
- . Advanced Internet Technologies.
- Gsephrioth. (2017). [*The IP diagram*<svg aria-labelledby="cds-react-aria-662-title" class="css-1lzqdox" fill="none" focusable="false" height="16" id="bkmrk--32" role="img" viewbox="0 0 16 16" width="16"></svg>](https://gsephrioth.github.io/Ch8-IP-Datagram/)

- *.*
- Wright, Robert. (October 1998). *IP Routing Primer*. O’Reilly.

# Week 2: Network operations

## Citations

[Network protocols<svg aria-labelledby="cds-react-aria-663-title" class="css-1lzqdox" fill="none" focusable="false" height="16" id="bkmrk--33" role="img" viewbox="0 0 16 16" width="16"></svg>](https://www.coursera.org/learn/networks-and-network-security/lecture/PUGBB/network-protocols)

- National Institute of Standards and Technology. (n.d.). [*Glossary*<svg aria-labelledby="cds-react-aria-664-title" class="css-1lzqdox" fill="none" focusable="false" height="16" id="bkmrk--34" role="img" viewbox="0 0 16 16" width="16"></svg>](https://csrc.nist.gov/glossary)

- *.* Accessed December 2022.

[Common network protocols<svg aria-labelledby="cds-react-aria-665-title" class="css-1lzqdox" fill="none" focusable="false" height="16" id="bkmrk--35" role="img" viewbox="0 0 16 16" width="16"></svg>](https://www.coursera.org/learn/networks-and-network-security/supplement/Tsifz/common-network-protocols)

- Cloudflare. (n.d.). [*What is a protocol? | Network protocol definition*<svg aria-labelledby="cds-react-aria-666-title" class="css-1lzqdox" fill="none" focusable="false" height="16" id="bkmrk--36" role="img" viewbox="0 0 16 16" width="16"></svg>](https://www.cloudflare.com/learning/network-layer/what-is-a-protocol/)
- *.*
- CompTIA. (n.d.). [*What is a network protocol and how does it work?* <svg aria-labelledby="cds-react-aria-667-title" class="css-1lzqdox" fill="none" focusable="false" height="16" id="bkmrk--37" role="img" viewbox="0 0 16 16" width="16"></svg>](https://www.comptia.org/content/guides/what-is-a-network-protocol)
- 
- Oracle. (n.d.). [*TCP/IP protocol architecture model*<svg aria-labelledby="cds-react-aria-668-title" class="css-1lzqdox" fill="none" focusable="false" height="16" id="bkmrk--38" role="img" viewbox="0 0 16 16" width="16"></svg>](https://docs.oracle.com/cd/E19683-01/806-4075/ipov-10/index.html)

- *.* System administration guide, volume 3.

[Additional network protocols <svg aria-labelledby="cds-react-aria-669-title" class="css-1lzqdox" fill="none" focusable="false" height="16" id="bkmrk--39" role="img" viewbox="0 0 16 16" width="16"></svg>](https://www.coursera.org/learn/networks-and-network-security/supplement/gh97f/additional-network-protocols)

- IBM. (2022, Oct 17). [*TCP/IP address and parameter assignment - Dynamic host configuration protocol*<svg aria-labelledby="cds-react-aria-670-title" class="css-1lzqdox" fill="none" focusable="false" height="16" id="bkmrk--40" role="img" viewbox="0 0 16 16" width="16"></svg>](https://www.ibm.com/docs/en/aix/7.1?topic=tcpp-tcpip-address-parameter-assignment-dynamic-host-configuration-protocol)
- . IBM AIX documentation.
- Microsoft. (n.d.O). [*What are IMAP and POP?*<svg aria-labelledby="cds-react-aria-671-title" class="css-1lzqdox" fill="none" focusable="false" height="16" id="bkmrk--41" role="img" viewbox="0 0 16 16" width="16"></svg>](https://support.microsoft.com/en-us/office/what-are-imap-and-pop-ca2c5799-49f9-4079-aefe-ddca85d5b1c9)
- Microsoft Support.
- Microsoft. (2013, October 21). [*SMTP*<svg aria-labelledby="cds-react-aria-672-title" class="css-1lzqdox" fill="none" focusable="false" height="16" id="bkmrk--42" role="img" viewbox="0 0 16 16" width="16"></svg>](https://learn.microsoft.com/en-us/previous-versions/office/developer/exchange-server-2010/aa494182(v=exchg.140))

- *.*

[The evolution of wireless security protocols<svg aria-labelledby="cds-react-aria-673-title" class="css-1lzqdox" fill="none" focusable="false" height="16" id="bkmrk--43" role="img" viewbox="0 0 16 16" width="16"></svg>](http://coursera.org/learn/networks-and-network-security/supplement/x73QK/overview-of-wireless-security-protocols)

- Asus. (2022, January 14).  [*\[Wireless\] What is WPA3? What are the advantages of using WPA3?*<svg aria-labelledby="cds-react-aria-674-title" class="css-1lzqdox" fill="none" focusable="false" height="16" id="bkmrk--44" role="img" viewbox="0 0 16 16" width="16"></svg>](https://www.asus.com/support/FAQ/1042478/)
- FAQ.
- Britannica, T. Editors of Encyclopaedia (2022, February 3). [*Wi-Fi*<svg aria-labelledby="cds-react-aria-675-title" class="css-1lzqdox" fill="none" focusable="false" height="16" id="bkmrk--45" role="img" viewbox="0 0 16 16" width="16"></svg>](https://www.britannica.com/technology/Wi-Fi)
- . *Encyclopedia Britannica*.
- Cisco Press. (2010, April 9). [*Moving to WPA/WPA2-Enterprise wi-fi encryption*<svg aria-labelledby="cds-react-aria-676-title" class="css-1lzqdox" fill="none" focusable="false" height="16" id="bkmrk--46" role="img" viewbox="0 0 16 16" width="16"></svg>](https://www.ciscopress.com/articles/article.asp?p=1576225)

- *.*

[Firewalls and network security measures <svg aria-labelledby="cds-react-aria-677-title" class="css-1lzqdox" fill="none" focusable="false" height="16" id="bkmrk--47" role="img" viewbox="0 0 16 16" width="16"></svg>](https://www.coursera.org/learn/networks-and-network-security/lecture/TrOAQ/firewalls-and-network-security-measures)

- Cisco. (n.d.). [*What is a firewall?* <svg aria-labelledby="cds-react-aria-678-title" class="css-1lzqdox" fill="none" focusable="false" height="16" id="bkmrk--48" role="img" viewbox="0 0 16 16" width="16"></svg>](https://www.cisco.com/c/en/us/products/security/firewalls/what-is-a-firewall.html)

- 

[Subnetting and CIDR<svg aria-labelledby="cds-react-aria-679-title" class="css-1lzqdox" fill="none" focusable="false" height="16" id="bkmrk--49" role="img" viewbox="0 0 16 16" width="16"></svg>](https://www.coursera.org/learn/networks-and-network-security/supplement/OObvl/subnetting-and-cidr)

- Cloudflare. (n.d.).[ *What is a subnet?*<svg aria-labelledby="cds-react-aria-680-title" class="css-1lzqdox" fill="none" focusable="false" height="16" id="bkmrk--50" role="img" viewbox="0 0 16 16" width="16"></svg>](https://www.cloudflare.com/learning/network-layer/what-is-a-subnet/)
- 
- Techopedia. (2017, July 18). [*Subnetting*<svg aria-labelledby="cds-react-aria-681-title" class="css-1lzqdox" fill="none" focusable="false" height="16" id="bkmrk--51" role="img" viewbox="0 0 16 16" width="16"></svg>](https://www.techopedia.com/definition/28328/subnetting)
- *.* Dictionary.
- IP Address Guide. (n.d.). [*CIDR to IPv4 Conversion*<svg aria-labelledby="cds-react-aria-682-title" class="css-1lzqdox" fill="none" focusable="false" height="16" id="bkmrk--52" role="img" viewbox="0 0 16 16" width="16"></svg>](https://www.ipaddressguide.com/cidr)

- . IPV4 Tools.

[Proxy servers<svg aria-labelledby="cds-react-aria-683-title" class="css-1lzqdox" fill="none" focusable="false" height="16" id="bkmrk--53" role="img" viewbox="0 0 16 16" width="16"></svg>](https://www.coursera.org/learn/networks-and-network-security/lecture/P0Wj5/securing-internal-networks-proxy-servers)

- National Institute of Standards and Technology. (n.d.). [*Glossary*<svg aria-labelledby="cds-react-aria-684-title" class="css-1lzqdox" fill="none" focusable="false" height="16" id="bkmrk--54" role="img" viewbox="0 0 16 16" width="16"></svg>](https://csrc.nist.gov/glossary)

- *.* Accessed December 2022.

# Week 3: Secure against network intrusions

## Resources

[Analyze network attacks<svg aria-labelledby="cds-react-aria-685-title" class="css-1lzqdox" fill="none" focusable="false" height="16" id="bkmrk--55" role="img" viewbox="0 0 16 16" width="16"></svg>](https://www.coursera.org/learn/networks-and-network-security/item/QHIX5)

- [CompTIA<svg aria-labelledby="cds-react-aria-686-title" class="css-1lzqdox" fill="none" focusable="false" height="16" id="bkmrk--56" role="img" viewbox="0 0 16 16" width="16"></svg>](https://www.comptia.org/blog/cybersecurity-skills-to-counter-ddos-attacks.)

- 

## Citations

[The case for securing networks <svg aria-labelledby="cds-react-aria-687-title" class="css-1lzqdox" fill="none" focusable="false" height="16" id="bkmrk--57" role="img" viewbox="0 0 16 16" width="16"></svg>](https://www.coursera.org/learn/networks-and-network-security/lecture/ZnVPC/the-case-for-securing-networks)

- Vinton, Kate. (2014, September 18). [*With 56 million cards compromised, Home Depot’s breach is bigger than Target’s*<svg aria-labelledby="cds-react-aria-688-title" class="css-1lzqdox" fill="none" focusable="false" height="16" id="bkmrk--58" role="img" viewbox="0 0 16 16" width="16"></svg>](https://www.forbes.com/sites/katevinton/2014/09/18/with-56-million-cards-compromised-home-depots-breach-is-bigger-than-targets/?sh=1514b8a53e74)

- *.* Forbes.

[Analyze network layer communication<svg aria-labelledby="cds-react-aria-689-title" class="css-1lzqdox" fill="none" focusable="false" height="16" id="bkmrk--59" role="img" viewbox="0 0 16 16" width="16"></svg>](https://www.coursera.org/learn/networks-and-network-security/quiz/6XQKU/activity-apply-os-hardening-techniques)

- Lager, Nathan. (2020, April 3). [Network Troubleshooting with Packet Captures<svg aria-labelledby="cds-react-aria-690-title" class="css-1lzqdox" fill="none" focusable="false" height="16" id="bkmrk--60" role="img" viewbox="0 0 16 16" width="16"></svg>](https://www.redhat.com/sysadmin/network-packet-captures)
- . Enable Sysadmin.
- Oracle. (n.d.) [How the TCP/IP Protocols Handle Data Communications (System Administration Guide: IP Services<svg aria-labelledby="cds-react-aria-691-title" class="css-1lzqdox" fill="none" focusable="false" height="16" id="bkmrk--61" role="img" viewbox="0 0 16 16" width="16"></svg>](https://docs.oracle.com/cd/E19683-01/806-4075/ipov-100/index.html)

- ).

[Real-life DDoS attack<svg aria-labelledby="cds-react-aria-692-title" class="css-1lzqdox" fill="none" focusable="false" height="16" id="bkmrk--62" role="img" viewbox="0 0 16 16" width="16"></svg>](https://www.coursera.org/learn/networks-and-network-security/supplement/9ndLQ/real-life-ddos-attack)

- Olenick, D. (2020, December 10) [*Guilty plea in 2016 Dyn DDos attack*<svg aria-labelledby="cds-react-aria-693-title" class="css-1lzqdox" fill="none" focusable="false" height="16" id="bkmrk--63" role="img" viewbox="0 0 16 16" width="16"></svg>](https://www.bankinfosecurity.com/guilty-plea-in-2016-dyn-ddos-attack-a-15567#:~:text=Federal%20prosecutors%20estimate%20the%20attack,million%20due%20to%20the%20attack.)
- *.* Bank info security.
- Young, K (2022, January 10) [*Cyber case study: The Mirai DDoS attack on Dyn*<svg aria-labelledby="cds-react-aria-694-title" class="css-1lzqdox" fill="none" focusable="false" height="16" id="bkmrk--64" role="img" viewbox="0 0 16 16" width="16"></svg>](https://coverlink.com/case-study/mirai-ddos-attack-on-dyn/#:~:text=On%20Oct.,systems%20and%20overwhelm%20its%20infrastructure)

- . Coverlink.

[Overview of interception attacks<svg aria-labelledby="cds-react-aria-695-title" class="css-1lzqdox" fill="none" focusable="false" height="16" id="bkmrk--65" role="img" viewbox="0 0 16 16" width="16"></svg>](https://www.coursera.org/learn/networks-and-network-security/supplement/zCdHP/overview-of-interception-tactics)

- Engebretson, P. (2013). *The basics of hacking and penetration testing: ethical hacking and penetration testing made easy*. Elsevier.

# Week 4: Security hardening

## Resources

[Course 3 glossary <svg aria-labelledby="cds-react-aria-696-title" class="css-1lzqdox" fill="none" focusable="false" height="16" id="bkmrk--66" role="img" viewbox="0 0 16 16" width="16"></svg>](https://www.coursera.org/learn/networks-and-network-security/supplement/lFqNR/course-3-glossary)

[Apply OS hardening techniques<svg aria-labelledby="cds-react-aria-697-title" class="css-1lzqdox" fill="none" focusable="false" height="16" id="bkmrk--67" role="img" viewbox="0 0 16 16" width="16"></svg>](https://www.coursera.org/learn/networks-and-network-security/quiz/6XQKU/activity-apply-os-hardening-techniques)

- [Opensource.com<svg aria-labelledby="cds-react-aria-698-title" class="css-1lzqdox" fill="none" focusable="false" height="16" id="bkmrk--68" role="img" viewbox="0 0 16 16" width="16"></svg>](https://opensource.com/article/18/10/introduction-tcpdump)
- 
- [Iana.org<svg aria-labelledby="cds-react-aria-699-title" class="css-1lzqdox" fill="none" focusable="false" height="16" id="bkmrk--69" role="img" viewbox="0 0 16 16" width="16"></svg>](http://iana.org)
- 
- [Geekflare<svg aria-labelledby="cds-react-aria-700-title" class="css-1lzqdox" fill="none" focusable="false" height="16" id="bkmrk--70" role="img" viewbox="0 0 16 16" width="16"></svg>](https://geekflare.com/tcpdump-examples/)
- 
- [Packet Pushers<svg aria-labelledby="cds-react-aria-701-title" class="css-1lzqdox" fill="none" focusable="false" height="16" id="bkmrk--71" role="img" viewbox="0 0 16 16" width="16"></svg>](https://packetpushers.net/masterclass-tcpdump-interpreting-output/)

- 

## Citations

[OS hardening practices <svg aria-labelledby="cds-react-aria-702-title" class="css-1lzqdox" fill="none" focusable="false" height="16" id="bkmrk--72" role="img" viewbox="0 0 16 16" width="16"></svg>](https://www.coursera.org/learn/networks-and-network-security/lecture/sj35a/os-hardening-practices)

- National Institute of Security Technology. (2018, October). [*Guide to securing macOS 10.12 systems for IT professionals*<svg aria-labelledby="cds-react-aria-703-title" class="css-1lzqdox" fill="none" focusable="false" height="16" id="bkmrk--73" role="img" viewbox="0 0 16 16" width="16"></svg>](https://csrc.nist.gov/CSRC/media/Publications/sp/800-179/rev-1/draft/documents/sp800-179r1-draft.pdf)

- *.* Special publication 800-179, revision 1. Accessed December 2022.

[Apply OS hardening techniques<svg aria-labelledby="cds-react-aria-704-title" class="css-1lzqdox" fill="none" focusable="false" height="16" id="bkmrk--74" role="img" viewbox="0 0 16 16" width="16"></svg>](https://www.coursera.org/learn/networks-and-network-security/quiz/6XQKU/activity-apply-os-hardening-techniques)

- Doropoulos, N. (n.d.). [DNS Query Flood Attack. <svg aria-labelledby="cds-react-aria-705-title" class="css-1lzqdox" fill="none" focusable="false" height="16" id="bkmrk--75" role="img" viewbox="0 0 16 16" width="16"></svg>](https://www.linkedin.com/pulse/dns-query-flood-attack-nicholas-doropoulos.)

- Linkedin.

[Use the NIST Cybersecurity Framework to respond to a security<svg aria-labelledby="cds-react-aria-706-title" class="css-1lzqdox" fill="none" focusable="false" height="16" id="bkmrk--76" role="img" viewbox="0 0 16 16" width="16"></svg>](https://www.coursera.org/learn/networks-and-network-security/exam/AFji2/portfolio-activity-use-the-nist-cybersecurity-framework-to-respond-to-a-security)

- Bhardwaj, P. (2023, January 2). [How to detect an ICMP flood attack and protect your network.<svg aria-labelledby="cds-react-aria-707-title" class="css-1lzqdox" fill="none" focusable="false" height="16" id="bkmrk--77" role="img" viewbox="0 0 16 16" width="16"></svg>](https://www.makeuseof.com/how-to-detect-icmp-flood-attack/)

- 

Firch, J. (2023, February 28). [How to prevent a ICMP flood attack. <svg aria-labelledby="cds-react-aria-708-title" class="css-1lzqdox" fill="none" focusable="false" height="16" id="bkmrk--78" role="img" viewbox="0 0 16 16" width="16"></svg>](https://purplesec.us/prevent-ping-attacks/)

Google, Android, Chronicle, Google Drive, Google Sites, and YARA are trademarks owned by Google LLC. All other trademarks belong to their respective owners and are not affiliated with Google LLC.