B1 IP Protocols

1)  IP protocols: IPv4 and IPv6, TCP, UDP and ICMP.

1.1) IPv4 and IPv6

5. The Internet Protocol (IP) | TCP/IP Illustrated, Volume 1: The Protocols, 2nd Edition (oreilly.com)

1.2) TCP

12. TCP: The Transmission Control Protocol (Preliminaries) | TCP/IP Illustrated, Volume 1: The Protocols, 2nd Edition (oreilly.com)

1.3) UDP

10. User Datagram Protocol (UDP) and IP Fragmentation | TCP/IP Illustrated, Volume 1: The Protocols, 2nd Edition (oreilly.com)

1.4) 8. ICMPv4 and ICMPv6: Internet Control Message Protocol | TCP/IP Illustrated, Volume 1: The Protocols, 2nd Edition (oreilly.com)


2) Detailed knowledge of application layer protocols commonly used by Trojan malware, namely TCP, UDP, HTTP[S], SMTP, and DNS.


3) In-depth understanding of how the Internet (web browser/server architecture) and email systems function.



4) Fundamental knowledge of at least the following protocols; IRC, DHCP, FTP, SMB, SNMP, ICMP.

4.1) IRC

What is IRC? (csun.edu)

Internet Relay Chat (IRC) protocol with Wireshark - Infosec Resources (infosecinstitute.com)

IRC (Internet Relay Chat) Protocol Activity to the Internet | SIEM Guide [7.8] | Elastic


4.2) DHCP 

6. System Configuration: DHCP and Autoconfiguration | TCP/IP Illustrated, Volume 1: The Protocols, 2nd Edition (oreilly.com)


4.3)FTP


4.4) SMB


4.5) SNMP


4.6) ICMP.

8. ICMPv4 and ICMPv6: Internet Control Message Protocol | TCP/IP Illustrated, Volume 1: The Protocols, 2nd Edition (oreilly.com)


Comments

Popular posts from this blog

CREST Practitioner Intrusion Analyst: CPIA Exam Information

A1 Engagement Lifecycle Management