Part 1: Protecting the Network – Technologies, Protocols, Vulnerabilities, and Tools

Upon completion of this part, readers will understand the structure of data network protocols and devices, understand breaches, and be familiar with the attacking tools and scripts that take advantage of these breaches.

This part of the book comprises the following chapters:

  • Chapter 1, Data Centers and the Enterprise Network Architecture and its Components
  • Chapter 2, Network Protocol Structures and Operations
  • Chapter 3, Security Protocols and Their Implementation
  • Chapter 4, Using Network Security Tools, Scripts, and Code
  • Chapter 5, Finding Protocol Vulnerabilities

Get Network Protocols for Security Professionals now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.