Skip to main contentSkip to main content
Room Banner
Back to all walkthroughs
Room Icon

Networking Secure Protocols

Premium room

Learn how TLS, SSH, and VPN can secure your network traffic.

easy

60 min

102,760

User profile photo.
User profile photo.
User profile photo.

To access material, start machines and answer questions login.

In the Networking Core Protocols room, we learned about the protocols used to browse the web and access email, among others. These protocols work great; however, they cannot protect the confidentiality, , or authenticity of the data transferred. In simpler terms, when we say that confidentiality is not protected, it means that someone watching the packets can read your password or credit card information when sent over . Similarly, they can access your private documents when sent via email. As for not protecting the of the data, it means that an adversary can change the contents of the transferred data; in other words, if you authorise the payment of one hundred pounds, they can easily change it to another value, such as eight hundred pounds. Authenticity means ensuring we are talking with the correct server, not a fake one. Important online transactions are risky without ensuring confidentiality, , and authenticity.

Transport Layer Security () is added to existing protocols to protect communication confidentiality, , and authenticity. Consequently, , , , and become HTTPS, POP3S, SMTPS, and IMAPS, where the appended ā€œSā€ stands for Secure. We will examine these protocols and the benefits we reaped from .

Similarly, it is deemed insecure to remotely access a system using the TELNET protocol; Secure Shell () was created to provide a secure way to access remote systems. Furthermore, is an extensible protocol that offers added security features for other protocols.

Room Prerequisites

This room is the last in a group of four rooms about computer networking:

We recommend finishing all the previous three rooms before starting this one.

Learning Objectives

Upon finishing this room, you will learn about:

  • SSL/
  • How to secure existing plaintext protocols:
  • How replaced the plaintext TELNET
  • How creates a secure network over an insecure one
Answer the questions below

Please ensure you have finished the Networking Core Protocols room at minimum.

Ready to learn Cyber Security?

The Networking Secure Protocols room is only available for premium users. Signup now to access more than 500 free rooms and learn cyber security through a fun, interactive learning environment.

Already have an account? Log in

We use cookies to ensure you get the best user experience. For more information see our cookie policy.