![]() The lectures in ‘Internet & Cyber Attacks’ include the most serious cyber attack types of Phishing, DoS (Denial of Service) & DDoS (Distributed DoS), Overflow, MITM (Man-in-the-Middle) Attack, and SQL (Structured Query Language) Injection. The lecture ‘Growing Security & Threat Issues’ discusses about zombie computers and botnets and other emerging attack techniques, which may be contaminating your PC/laptop/smartphone. Your PC/laptop/smartphone has been receiving these attacks 100%, you just did not know it, but now you will. The first lecture ‘Top Ranking Internet Attacks’ describes the most commonly occurring attack types and ranks them based on the percentage of attack incidents. The module ‘Internet Security’ focuses on the most popular Internet attack types and describes the methods used by your PC/laptop/smartphone to prevent and defend against cyber attacks. The last lecture ‘E-mail’ compares the characteristics of IMAP (Internet Message Access Protocol) and POP3 (Post Office Protocol version 3) and how they operate in serving your all your e-mails. The lectures ‘RPC’ and ‘FTP’ describes how RPC (Remote Procedure Call) had been enabling you to make connections to remote computers/servers, and how FTP (File Transfer Protocol) helped you move files from a remote computer/server to your PC/laptop so quickly. ![]() The lectures ‘ARP’ and ‘NAT’ explains how you have used ARP (Address Resolution Protocol) and NAT (Network Address Translation) to inter-changing IP addresses for access to private networks and how your PC/laptop/smartphone had been finding IP addresses from web host names. ![]() The lecture ‘OSPF’ describes how OSPF (Open Shortest Path First) sets up SPT (Shortest Path Tree) routing paths, which makes your Internet connections more reliable and fast. EGP’ is focused on the types and functions of IGPs (Interior Gateway Protocols) and EGPs (Exterior Gateway Protocols). ![]() The third module ‘Internet Routing & Functions’ focuses on the main protocols and functions used in the Internet that you have been using every day to make network connections. ![]()
0 Comments
Leave a Reply. |