Table of Contents

Complete chapter listing for the Enhanced Edition

Front Matter

Part I: Network Theory

Building your foundational understanding of how networks operate

Ch. Title Key Topics
- Part I Introduction Overview and objectives
1 Introduction to Computer Networks Network types, topologies, devices, history
2 The OSI Model & TCP/IP Stack Layer models, encapsulation, protocol stacks
3 Data Link Layer Protocols Ethernet, MAC, ARP, VLANs, 802.1X
4 Internet Protocol (IP) IPv4, IPv6, subnetting, NAT, ICMP
5 Transport Layer Protocols TCP, UDP, QUIC, congestion control
6 Application Layer Protocols DNS, HTTP/1-3, TLS 1.3, SMTP, FTP
7 Routing and Network Infrastructure Static/dynamic routing, BGP, OSPF, SD-WAN
8 Wireless Networking 802.11, WiFi 6/6E, WPA3, Bluetooth
9 Cloud Networking Fundamentals VPCs, cloud architecture, hybrid connectivity
10 Container and Microservices Networking Docker, Kubernetes, service mesh, CNI
11 Software-Defined Networking SDN, OpenFlow, NFV, intent-based networking

Part II: Vulnerability Study

Understanding and exploiting network security weaknesses

Ch. Title Key Topics
- Part II Introduction Security mindset and methodology
1 Introduction to Network Security CIA triad, threat modeling, ethics
2 Physical & Data Link Layer Attacks ARP spoofing, MAC attacks, VLAN hopping
3 Network Layer Vulnerabilities IP spoofing, ICMP attacks, routing exploits
4 Transport Layer Exploits TCP attacks, session hijacking, port scanning
5 Application Layer Attacks DNS poisoning, HTTP attacks, protocol exploits
6 Man-in-the-Middle Attack Patterns Interception, modification, relay attacks
7 Denial of Service Attacks DoS/DDoS, amplification, botnets
8 Wireless Network Exploitation WPA attacks, evil twin, deauthentication
9 Network Reconnaissance Techniques Scanning, enumeration, OSINT
10 Cloud Security and Attack Vectors Cloud misconfig, IAM, metadata attacks
11 API and Modern Application Security REST, GraphQL, OAuth, JWT attacks
12 IoT and Embedded Systems Security IoT protocols, firmware, hardware hacking
13 APT and Modern Malware MITRE ATT&CK, C2, threat hunting
14 Defense and Mitigation Strategies Zero Trust, NDR, defense in depth

Part III: Hands-On Labs

Practical exercises to reinforce learning

Lab Title Duration
0 Lab Environment Setup 2-3 hours
1 Network Analysis Labs 4-6 hours
2 Layer 2 Attack Labs 3-4 hours
3 Layer 3 Attack Labs 3-4 hours
4 Transport Layer Attack Labs 4-5 hours
5 Application Layer Attack Labs 5-6 hours
6 Wireless Attack Labs 4-5 hours
7 Cloud Security Labs 4-6 hours
8 Detection and Response Labs 5-6 hours
9 Capstone Projects 10-20 hours

Appendices

App. Title Description
A RFC Reference Guide Essential RFCs for networking and security
B Tool Setup Guide Installing and configuring lab tools
C Comprehensive Glossary Terms, definitions, and explanations
D Legal Considerations Laws, ethics, and authorization
E Quick Reference Cards Printable cheatsheets
F Continued Learning Resources, communities, and next steps
G Lab Troubleshooting Common issues and solutions