Participants will be review how network models work using the TCP/IP model and protocols as an example. Throughout the course participants will identify how protocols support cyber security goals.
To access this course you must purchase "Introductory Series: Course 1 - Introduction to Cyber Security" that gives access to the entire Introductory Series.