How devices communicate over networks using protocols and IPs.
Protecting Windows/Linux systems through accounts, patches, and logs.
The common ways attackers break in and cause damage.
Using encryption and hashing to keep data private and secure.
Tools like firewalls, IDS, and SIEMs that defend networks.
Finding and fixing system weaknesses before attackers do.
Controlling who can access what, and how they prove it.
Steps and analysis for handling and investigating cyberattacks.
Frameworks and rules that guide security and reduce risk.