Understanding Cyber Security part 3 - TCP/IP Network com
Published 9/2025
Duration: 3h 2m | .MP4 1280x720 30 fps(r) | AAC, 44100 Hz, 2ch | 1.84 GB
Genre: eLearning | Language: English
Published 9/2025
Duration: 3h 2m | .MP4 1280x720 30 fps(r) | AAC, 44100 Hz, 2ch | 1.84 GB
Genre: eLearning | Language: English
Hands-on network communication - understanding IP and TCP network communication
What you'll learn
- Build an in-depth understanding of the most important layers of network communications - IP and TCP
- Understand how IP addresses are assigned and how packets are routed across the Wide area Network
- Thoroughly understand the flow of IP and TCP transmission over the web
- Analyze network recordings and detect naïve and malicious IP and TCP packets , such as DDOS and IP spoofing
Requirements
- Entry level course, attending "Understanding Cyber Security part 1" is recommended
Description
This is thethird coursein a six-part series on network communication, which includes the following modules:Networks Fundamentals, The power of Wireshark, TCP/IP Protocols,Network Communication Programming with Python,Web Protocols in Action, andCyber Attack Analysis. Together, these courses provide a comprehensive foundation in networking, combining theoretical knowledge with hands-on skills for analyzing, building, and defending networked systems. This series is designed for students who wish to develop a deep and practical understanding of how modern networks operate, how data flows across systems, and how vulnerabilities in these networks can be detected and mitigated.
Thisthirdcourse focuses on theInternet Protocol (IP)and theTransmission Control Protocol (TCP)— the core protocols that enable reliable communication over the Internet. Students will exploreIP addressing, subnetting,routingconcepts, and packet structure. They will analyze how IP handles fragmentation, addressing, and delivery, as well as howICMP(Internet Control Message Protocol) supports diagnostics and error reporting.
Building on the foundation from the first course, students will use Wireshark extensively to capture and dissect IP and TCP packets, interpret sequence and acknowledgment numbers, analyze TCP’sthree-way handshake, and understand connection teardown. Special attention will be given to TCP reliability mechanisms such asretransmissions, flow control, and congestion control, along with commonTCP and IP-based attackvectors, including spoofing, scanning, and denial-of-service (DOS) techniques. Building on concepts from earlier courses, students will integrate this knowhow with protocol analysis—usingWiresharkto explore how retransmissions, flow control, and congestion control behave in real network conditions.
By the end of this module, students will have a solid understanding of how IP ensures data delivery across diverse networks and how TCP establishes and maintains reliable connections. They will be able to interpret packet captures to diagnose connectivity issues, identify abnormal patterns in TCP/IP flows, and recognize early signs of network-based attacks — skills that are essential for advanced intrusion detection, protocol analysis, and secure network application development in later courses.
Who this course is for:
- This course is intended for every high school and university student, seeking knowledge and knowhow in cybersecurity. It strives to facilitate learning by thinking and understanding, and to promote students' proficiency in handling complex ideas and mastering cybersecurity software projects.
More Info