Computer Networking and Cyber Security

Computer Networking and Cyber Security

Studies the design, implementation, and management of computer networks, including the Internet.

  1. What happens when you type a URL into your browser?
  2. Security, Authentication, Authorization and SSL
    1. Authentication vs Authorization
    2. Understanding the password anti-pattern
    3. Federated Identity
    4. SAML
    5. OAuth 2.0
      1. OAuth Grant Types and Flows
      2. Understanding Google OAuth
    6. OIDC: Secure Authentication with OpenID Connect
      1. Understanding ID Token
    7. API Keys
    8. Understanding SSL
    9. Spring security
    10. Javascript - fetch requests with Bearer tokens
    11. Asymmetric encryption
      1. SSH keys
      2. GPG keys
      3. Key Differences and Overlaps between SSH keys and GPG keys
      4. Who has the key in End-to-End Encryption?
      5. How Passkeys Work - and How to Use Them
  3. Internet Protocol (IP)
    1. TCP and TCP Handshake
    2. What is the difference between UDP and TCP?
  4. How does a VPN work?
  5. VPN set-up
  6. DNS Leaks
  7. OpenVPN vs. WireGuard

Reading material

  1. What Is Single Sign-On (SSO)? https://www.fortinet.com/resources/cyberglossary/single-sign-on
  2. What Is The Principle Of Least Privilege? https://www.fortinet.com/resources/cyberglossary/principle-of-least-privilege
  3. What Is Access Control? https://www.fortinet.com/resources/cyberglossary/access-control
  4. What is IAM (Identity and Access Management)? https://www.fortinet.com/resources/cyberglossary/identity-and-access-management
  5. What Is Network Access Control (NAC)? https://www.fortinet.com/resources/cyberglossary/what-is-network-access-control

Links to this note