Table of Contents
Complete chapter listing for the Enhanced Edition
Front Matter
Part I: Network Theory
Building your foundational understanding of how networks operate
| Ch. | Title | Key Topics |
|---|---|---|
| - | Part I Introduction | Overview and objectives |
| 1 | Introduction to Computer Networks | Network types, topologies, devices, history |
| 2 | The OSI Model & TCP/IP Stack | Layer models, encapsulation, protocol stacks |
| 3 | Data Link Layer Protocols | Ethernet, MAC, ARP, VLANs, 802.1X |
| 4 | Internet Protocol (IP) | IPv4, IPv6, subnetting, NAT, ICMP |
| 5 | Transport Layer Protocols | TCP, UDP, QUIC, congestion control |
| 6 | Application Layer Protocols | DNS, HTTP/1-3, TLS 1.3, SMTP, FTP |
| 7 | Routing and Network Infrastructure | Static/dynamic routing, BGP, OSPF, SD-WAN |
| 8 | Wireless Networking | 802.11, WiFi 6/6E, WPA3, Bluetooth |
| 9 | Cloud Networking Fundamentals | VPCs, cloud architecture, hybrid connectivity |
| 10 | Container and Microservices Networking | Docker, Kubernetes, service mesh, CNI |
| 11 | Software-Defined Networking | SDN, OpenFlow, NFV, intent-based networking |
Part II: Vulnerability Study
Understanding and exploiting network security weaknesses
| Ch. | Title | Key Topics |
|---|---|---|
| - | Part II Introduction | Security mindset and methodology |
| 1 | Introduction to Network Security | CIA triad, threat modeling, ethics |
| 2 | Physical & Data Link Layer Attacks | ARP spoofing, MAC attacks, VLAN hopping |
| 3 | Network Layer Vulnerabilities | IP spoofing, ICMP attacks, routing exploits |
| 4 | Transport Layer Exploits | TCP attacks, session hijacking, port scanning |
| 5 | Application Layer Attacks | DNS poisoning, HTTP attacks, protocol exploits |
| 6 | Man-in-the-Middle Attack Patterns | Interception, modification, relay attacks |
| 7 | Denial of Service Attacks | DoS/DDoS, amplification, botnets |
| 8 | Wireless Network Exploitation | WPA attacks, evil twin, deauthentication |
| 9 | Network Reconnaissance Techniques | Scanning, enumeration, OSINT |
| 10 | Cloud Security and Attack Vectors | Cloud misconfig, IAM, metadata attacks |
| 11 | API and Modern Application Security | REST, GraphQL, OAuth, JWT attacks |
| 12 | IoT and Embedded Systems Security | IoT protocols, firmware, hardware hacking |
| 13 | APT and Modern Malware | MITRE ATT&CK, C2, threat hunting |
| 14 | Defense and Mitigation Strategies | Zero Trust, NDR, defense in depth |
Part III: Hands-On Labs
Practical exercises to reinforce learning
| Lab | Title | Duration |
|---|---|---|
| 0 | Lab Environment Setup | 2-3 hours |
| 1 | Network Analysis Labs | 4-6 hours |
| 2 | Layer 2 Attack Labs | 3-4 hours |
| 3 | Layer 3 Attack Labs | 3-4 hours |
| 4 | Transport Layer Attack Labs | 4-5 hours |
| 5 | Application Layer Attack Labs | 5-6 hours |
| 6 | Wireless Attack Labs | 4-5 hours |
| 7 | Cloud Security Labs | 4-6 hours |
| 8 | Detection and Response Labs | 5-6 hours |
| 9 | Capstone Projects | 10-20 hours |
Appendices
| App. | Title | Description |
|---|---|---|
| A | RFC Reference Guide | Essential RFCs for networking and security |
| B | Tool Setup Guide | Installing and configuring lab tools |
| C | Comprehensive Glossary | Terms, definitions, and explanations |
| D | Legal Considerations | Laws, ethics, and authorization |
| E | Quick Reference Cards | Printable cheatsheets |
| F | Continued Learning | Resources, communities, and next steps |
| G | Lab Troubleshooting | Common issues and solutions |