To access material, start machines and answer questions login.
This room is the third room in a series of four rooms about computer networking:
- Networking Concepts
- Networking Essentials
- Networking Core Protocols (this room)
- Networking Secure Protocols
Room Prerequisites
To benefit from this room, we recommend that you know the following:
- ISO OSI model and layers
- /IP model and layers
- Ethernet, IP, and protocols
In other words, starting this room after Networking Concepts is the recommended approach.
Learning Objectives
By the time you finish this room, you will have learned about the following protocols:
- WHOIS
- and
- , , and
Click on the Start AttackBox button at the top; click on the Start Machine button belowt to start the attached virtual machine ().
Give them about 2-3 minutes to boot up. Once the two machines are ready, we need to start the terminal on the AttackBox to follow along starting with Task 4.
Get your notepad ready, and let’s begin.
Ready to learn Cyber Security?
The Networking Core Protocols room is only available for premium users. Signup now to access more than 500 free rooms and learn cyber security through a fun, interactive learning environment.
Already have an account? Log in
