Part 1: Protecting the Network – Technologies, Protocols, Vulnerabilities, and Tools
Upon completion of this part, readers will understand the structure of data network protocols and devices, understand breaches, and be familiar with the attacking tools and scripts that take advantage of these breaches.
This part of the book comprises the following chapters:
- Chapter 1, Data Centers and the Enterprise Network Architecture and its Components
- Chapter 2, Network Protocol Structures and Operations
- Chapter 3, Security Protocols and Their Implementation
- Chapter 4, Using Network Security Tools, Scripts, and Code
- Chapter 5, Finding Protocol Vulnerabilities