The TCP/IP Transport Layer and Internet Security Threats

This course is included in our On-demand training solution.

Overview

Many of the functions of the TCP/IP suite are governed by the transport layer protocols TCP and UDP. This course provides an overview of how these protocols provide options such as reliability and connection oriented service. Additionally, service providers using TCP/IP are exposed to a wide spectrum of security threats. This course also covers the security concerns of the service provider. This knowledge provides the network engineer with a better understanding of the foundational elements of application layer protocols and how to secure their network. This course is one of a series in the Skillsoft learning path that covers the objectives for the Cisco exam Building Cisco Service Provider Next-Generation Networks Part 1 exam (640-875 SPNGN1). This exam counts toward the CCNA Service Provider certification.

Target Audience

This course is targeted at networking engineers who must interface with Cisco IOS, IOS XR and IOS XE devices. Additionally, those who have a need to understand technologies used in the service provider realm will benefit.

Prerequisites

None

Expected Duration

60 min.

Course Objectives

Course Introduction

Transport Layer

  • describe the Transport Layer of the TCP/IP suite
  • UDP Characteristics

  • describe characteristics of UDP
  • TCP Characteristics

  • describe characteristics of TCP
  • TCP/IP Application Layer Overview

  • describe the Application Layer of the TCP/IP suite
  • Interaction with Network and Application Layer

  • describe how different layers interoperate in the TCP/IP suite
  • Establishing a Connection

  • describe the steps of TCP’s connection-oriented behavior
  • Closing a Connection

  • describe how TCP closes a connection
  • Flow Control

  • describe basic flow control operation
  • TCP Sequence and Acknowledgment Numbers

  • identify TCP sequence and acknowledgment numbers
  • TCP Windowing

  • describe TCP windowing
  • Common Network Attacks

  • identify common network attacks
  • Threat Capabilities

  • identify threats to the network
  • Closed and Open Networks

  • compare closed and open networks
  • Need for Network Security

  • describe the need for network security
  • CIA Triad

  • describe the components of the CIA Triad
  • Cisco Network Foundation Protection

  • describe Cisco Network Foundation Protection
  • E-Business Challenge

  • describe security challenges for an E-Business
  • Adversaries, Motivations, and Classes of Attack

  • compare adversaries, adversary motivations, and classes of attack
  • Service Provider Specific Attacks

  • list service provider specific attacks
  • Exercise: Reviewing transport layer functions

    SUBSCRIPTION COST



     

    NEED HELP OR NOT SURE?