Network Protocol Deep Dives

Paths

Network Protocol Deep Dives

Authors: Jim Rizzo, Greg Dickinson, Nick Russo, Sean Wilkins , Joe Abraham, David Clinton, Aaron Staines

These courses take you into the realm of network protocols, showing you the basics of each network protocol before diving deeper into their functionality and applications... Read more

What you will learn

  • For each course, you will learn what the protocol is used for, the theory of its operation, seeing it in action, and troubleshooting

Pre-requisites

You should have a background in IT and a basic understanding of IT Networking

Network Protocol Deep Dives

These courses take you into the realm of network protocols, showing you the basics of each network protocol before diving deeper into their functionality and applications throughout the IT world. This is a sampler platter in the sense that the courses aren’t necessarily meant to be viewed in any particular order. But after watching any course, you’ll have a much better understanding of each network protocol you’re interested in.

Protocol Deep Dive: Address Resolution Protocol (ARP)

by Jim Rizzo

Apr 3, 2018 / 4h 35m

4h 35m

Start Course
Description

Address Resolution Protocol (ARP) is foundational for nearly all LAN communication. Because ARP and its variations are so widely relied upon, a deep understanding of ARP is necessary to support network communications, troubleshoot interoperability issues, and improve the efficiency of networks. Furthermore, it is critically important that you understand its nature so you can reduce and prevent related cyber threats. In this course, Protocol Deep Dive: Address Resolution Protocol (ARP), you will learn ARP from the ground up, including every part of Address Resolution Protocol messages, their functions and variations, and their security risks. First, you will learn how to capture ARP and use those captures to identify ARP messaging and troubleshoot ARP-related problems. Next, you will explore the details of every major ARP variation, learning how they apply to network communications. Finally, you will examine best practices and procedures you can apply to common LAN ARP-based attacks. By the end of this course, you will be able to clearly identify how ARP communications are used, when and how they might cause problems or security risks, and which solutions are appropriate in any given scenario.

Table of contents
  1. Course Overview
  2. Address Resolution Protocol Fundamentals
  3. Understanding InARP, GARP, RARP, and Proxy ARP
  4. Troubleshooting Common ARP Issues
  5. Addressing ARP-related Security Risks

Protocol Deep Dive: DHCP

by Greg Dickinson

Mar 1, 2017 / 1h 48m

1h 48m

Start Course
Description

Are you responsible for maintaining your company's network and wonder exactly how the DHCP protocol helps with that? Then this course, Protocol Deep Dive: DHCP, is the course for you! First, you will learn the specifics of exactly how the DHCPv4 and DHCPv6 protocols work, all the way down to the packet level. Next, you will learn how to properly configure a DHCP server on Windows Server and Cisco platforms. Finally, you will learn the methodology behind troubleshooting issues that may arise. When the course is completed, you will have a thorough understanding of the DHCP protocol and have the confidence to deploy it in your network.

Table of contents
  1. Course Overview
  2. Course Overview and DHCPv4
  3. Understanding DHCPv6
  4. Troubleshooting DHCP

Protocol Deep Dive: ICMP

by Nick Russo

Feb 26, 2019 / 2h 1m

2h 1m

Start Course
Description

Modern networks are becoming larger and more complex. In this course, Protocol Deep Dive: ICMP, you will gain clarity on the basics of ICMP to use it for network administration in many environments. First, you will learn core ICMP troubleshooting tools, such as ping and traceroute. Next, you will discover how to identify packet fragmentation and secure networks in harmony with ICMP. Finally, you will explore how IPv6 Neighbor Discovery really works while also sharpening your IPv6 ICMP troubleshooting skills. Throw in a bit of IPv6 network security and you'll be much better prepared for your next big IPv6 rollout. When you’re finished with this course, you will have the skills and knowledge of ICMP as a protocol needed to effectively operate, maintain, and troubleshoot enterprise and carrier-grade networks.

Table of contents
  1. Course Overview
  2. Using Ping
  3. Using Traceroute
  4. Conquering the Fear of Fragmentation
  5. Designing Network Security for ICMP
  6. Mastering IPv6 Neighbor Discovery
  7. Exploring the IPv6 Toolset

Protocol Deep Dive: IGMP and MLD

by Nick Russo

Mar 8, 2019 / 1h 58m

1h 58m

Start Course
Description

IP multicast is a challenging topic in networking to master. In this course, Protocol Deep Dive: IGMP and MLD, you will learn foundational knowledge of/gain the ability to how hosts communicate their interest in receiving multicast to the network. First, you will learn about IGMP, the IPv4 protocol used to share this information within the context of a real network. Next, you will discover the inner workings of MLD, the IGMP equivalent in the IPv6 world, along with all its enhancements and caveats. Finally, you will explore how to design your security infrastructure to "play nice" with IGMP and MLD, along with mastery of a powerful troubleshooting tool called multicast traceroute. When you’re finished with this course, you will have the skills and knowledge surrounding IGMP and MLD needed to troubleshoot and optimize multicast transport at the network edges.

Table of contents
  1. Course Overview
  2. Introduction to IPv4 Multicast and IGMPv1
  3. Better Performance with IGMPv2
  4. New Multicast Designs with IGMPv3
  5. The Future of Neworking: IPv6 Multicast and MLDv1
  6. New Multicast Designs with MLDv2
  7. Troubleshooting and Securing IGMP and MLD

Protocol Deep Dive: OSPF

by Sean Wilkins

Oct 7, 2019 / 3h 41m

3h 41m

Start Course
Description

In this course, Protocol Deep Dive: OSPF, you will learn foundational knowledge of OSPF. First, you will learn about OSPF's essential concepts, which will then be built on as the course continues. Next, you'll focus on OSPF relationships: how they work, what can prevent them from working, as well as a closer look at the OSPF packet and how information is exchanged between OSPF devices. You'll also take a closer look at how OSPF implements hierarchy through the use of areas, including what their effect is, the different area types, as well as the different additional messages that are used. Finally, you'll spend some additional time in the lab and look over how different issues can be found and fixed. When you are finished with this course, you will have the skills and knowledge of OSPF needed to successfully navigate its use in most common enterprise environments.

Table of contents
  1. Course Overview
  2. Covering OSPF Basics
  3. Forming Basic OSPF Relationships
  4. Discussing Simple OSPF Communication Blocks
  5. Introducing Multi-area OSPF (Hierarchy)
  6. Troubleshooting Common OSPF Issues

Protocol Deep Dive: EIGRP

by Sean Wilkins

Feb 5, 2019 / 3h 46m

3h 46m

Start Course
Description

EIGRP is a routing protocol that is commonly used on enterprise networks, but often it is not completely understood. In this course, Protocol Deep Dive: EIGRP, you will learn foundational knowledge of EIGRP. First, you will learn about the EIGRP's essential concepts, which will then be built on as the course continues. Next, you will focus on EIGRP neighborships, how they work, and what can prevent them from working. You will also learn how information is exchanged between EIGRP devices and how to understand why each message is sent, as well as move to a lab environment where you can see the concepts in operation. Finally, you will explore a few more advanced EIGRP topics that are commonly seen on modern networks, and then end the course with a module on EIGRP load balancing and how its operations differ from other routing protocol options. When you are finished with this course, you will have the skills and knowledge of EIGRP needed to successfully navigate its use in most common enterprise environments.

Table of contents
  1. Course Overview
  2. Covering EIGRP Essentials
  3. Digging into EIGRP Relationships
  4. Determining How Information Is Exchanged with EIGRP
  5. Showing How Information Is Exchanged with EIGRP
  6. Covering EIGRP Advanced Topics
  7. Reviewing EIGRP Load-balancing

Protocol Deep Dive: IPsec

by Joe Abraham

Oct 28, 2019 / 2h 26m

2h 26m

Start Course
Description

IPsec is used in our environments and on our endpoints to secure our traffic. It enables us to transmit our information securely across unsecured connections. Learning how to configure, verify, and analyze IPsec in your environments will help you improve your organization's security posture. In this course, Protocol Deep Dive: IPsec, you will gain the skills necessary to use this technology and have a deep understanding of the protocol suite. First, you will learn all about the underlying protocols that make up IPsec and how they work together to make it work. Next, you will discover IKE and the role that it plays in the IPsec suite. Finally, you will explore IKEv1 and IKEv2, and see the differences between them so you can fully understand how and why you should implement them. When you're finished with this course, you will have a full understanding of the protocol suite and be able to utilize it effectively in many different ways and implementation methods.

Table of contents
  1. Course Overview
  2. Learning IPsec Fundamentals
  3. Building the IPsec Protocol
  4. Using IPsec in the Enterprise
  5. Securing the Network with IKEv1
  6. Establishing IPsec with IKEv2
  7. Implementing IPsec in IPv6
  8. Finalizing IPsec Concepts

Protocol Deep Dive: SNMP

by Greg Dickinson

Jun 7, 2019 / 1h 28m

1h 28m

Start Course
Description

Network monitoring is a key component of a well-designed network, and SNMP is the most common management protocol on modern networks. In this course, Protocol Deep Dive: SNMP, you will learn foundational knowledge and gain the ability to manage your networks using SNMP. First, you will learn the specifics of SNMP versions 1, 2c, and 3, all the way down to the packet level. Next, you will learn how to properly configure SNMP for management on Windows Server, Linux, and Cisco platforms. Finally, you will build a network monitoring system and learn how it can help in diagnosing issues. When the course is completed, you will have a thorough understanding of both SNMP and the basics of network monitoring.

Table of contents
  1. Course Overview
  2. Overview of SNMP
  3. Managing Devices With SNMP
  4. Configuring SNMP
  5. Monitoring Systems With SNMP
  6. Troubleshooting Using SNMP

Protocol Deep Dive: FTP and Its Variants

by Nick Russo

May 9, 2019 / 2h 23m

2h 23m

Start Course
Description

Whether you are a business administrator or engineer of any flavor, you'll certainly require the ability to quickly, easily, and securely transfer files. In this course, Protocol Deep Dive: FTP and Its Variants, you will learn foundational knowledge required to deploy and operate a variety of file transfer services. First, you will learn about the classic FTP operating modes, active and passive, along with all the technical details surrounding their operation. Next, you will discover how to overcome security flaws with the original FTP specification by deploying FTP Secure via SSL (FTPS) or SSH-based FTP (SFTP). Finally, you will explore how to preserve your enterprise's file transfer capabilities during an IPv6 migration, which includes protocol messaging and security updates. When you're finished with this course, you will have the skills and knowledge needed to select the right file transfer method given a specific business goal or outcome. This includes expert-level troubleshooting, fault isolation, and detailed packet flow analysis.

Table of contents
  1. Course Overview
  2. Starting at the Beginning: FTP Active Mode
  3. Simplifying Operations with FTP Passive Mode
  4. Protecting Data with FTP Secure (FTPS)
  5. Improving Confidentiality with SSH FTP (SFTP)
  6. Simplifying File Transfers with Trivial FTP (TFTP)
  7. Modernizing FTP with IPv6

Protocol Deep Dive: SSH and Telnet

by David Clinton

Aug 18, 2016 / 40m

40m

Start Course
Description

Remote connectivity is a basic and critical tool for just about any modern technology task, and the SSH - and to a much lesser degree, Telnet - protocols can play large parts in connectivity solutions. However, the complexity of network infrastructure means that establishing and maintaining reliable connections can sometimes be challenging. This course, Protocol Deep Dive: SSH and Telnet, will help you overcome those challenges. You'll start with some SSH connectivity troubleshooting and debugging, as well as care and feeding of the Wireshark network monitoring tool. You'll also get to see the Telnet remote communication protocol, when to use it...and when to avoid it. After completing this course, you'll be able to describe the basic design and function of both SSH and Telnet, tackle some common problems, and have experienced some helpful troubleshooting techniques.

Table of contents
  1. Course Overview
  2. The Secure Shell (SSH) Protocol
  3. The Telnet Protocol

Protocol Deep Dive: TCP and UDP

by Aaron Staines

Jan 9, 2020 / 1h 42m

1h 42m

Start Course
Description

At the core of the Layer 4 Transport protocol is a thorough knowledge of TCP and UDP. In this course, Protocol Deep Dive: TCP and UDP, you’ll learn how to analyze and troubleshoot TCP and UDP issues. First, you’ll learn about network ports. Next, you’ll explore the operational theory of TCP and UDP functions. Then, you’ll dive deeper into TCP and UDP by performing packet analysis with Wireshark. Finally, you’ll discover how to troubleshoot common and not-so-common TCP and UDP related issues. When you’re finished with this course, you’ll have a foundational knowledge of TCP and UDP that will help you as you move forward as a more well-versed network engineer.

Table of contents
  1. Course Overview
  2. Protocol Introduction
  3. TCP / UDP Theory of Operation
  4. TCP / UDP Ready Set Action
  5. Troubleshooting TCP / UDP Issues