Cyber With KT
Ctrlk
  • About Me
  • 🗃️Courses
    • TCM
      • Practical Ethical Hacking (TCM)
        • Intro
        • Networking Refresher
          • IP Addresses
          • MAC Addresses
          • TCP, UDP, and the Three-Way Handshake
          • Common Ports and Protocols
          • The OSI Model
          • Subnetting
        • Setting Up Our Lab
        • Introduction to Linux
        • Introduction to Python
        • Information Gathering (Reconnaissance)
        • Scanning & Enumeration
        • Vulnerability Scanning with Nessus
        • Exploitation Basics
      • Practical Security Fundamentals
    • Cybrary
    • HackingLK
    • Hackviser
    • CWL
  • 📚Concepts
  • 🏁Challenges/CTFs
  • 🚩Walkthrough/Writeups
  • 🛠️Tools & Commands
  • 💎Projects
  • 📱Content Creation
  • 📝Cheat Sheets
  • 🔍OSINT Tools & Notes
  • 🐞Bug Bounty
  • 💡Research & Experiments
  • Templates & Reporting
  • Interview & Certification Prep
Powered by GitBook
On this page
  1. 🗃️Courses
  2. TCM
  3. Practical Ethical Hacking (TCM)
  4. Networking Refresher

TCP, UDP, and the Three-Way Handshake

PreviousMAC AddressesNextCommon Ports and Protocols

Last updated 6 months ago