Network Security

This module explores the core principles of network security, focusing on first principles and hardware constraints to build world-class, production-ready expertise. We delve into how physical hardware limits dictate security protocol design, from the CPU cycles required for asymmetric encryption to the memory table constraints that make stateful firewalls vulnerable to exhaustion.

  1. TLS/SSL Handshake
  2. Firewalls and IDS
  3. VPN and Tunneling
  4. DoS and DDoS Attacks
  5. Network Access Control
  6. Module Review