Network Engineering
IP + Port = Socket 🌐
Tarmoq va Internet
OSI7Layer va TCP/IP Stack
Socket Tushunchalari
World Wide Web (WWW)
Axborot va Xavfsizlik
Tarmoq va Xavfsizlik
Tizim va Xavfsizlik
Dastur va Xavfsizlik
“4PMs — More than a concept” by Xurshidbek
Network & Internet
1- IP
2- Modem
3- Home Router
4- Switch
5- LAN
6- CPT
7- WAN
8- Tarmoq
9- Internet
10- ISPs
11- TIERS
12- Tier1, Tier2, Tier3
13- ISP Routers
14- Belman, Dijkstra
15- Node
16- EndSystem, Host
10- Client, Server
OSI7Layers & TCP/IP Stack
1- Tarmoq
2- Tarmoq protokoli
3- Qatlamli arxitektura
4- OSI7 Layers
5- TCP/IP Stack
5- Application layer(L7: HTTP)
6- Presentation layer(L6: Format)
7- Session layer(L5: RPC)
8- Transport layer(L3: TCP, UDP)
9- Network layer(L3: IP)
10- Data link layer(L2: MAC)
11- Physical layer(L1: Bits)
12- Routers (3 layers)
13- Network layer
14- Data link layer
15- Physical layer
16- TCP/IP Stack (4 layers)
17- Application layer
18- Transport layer
19- Internet layer
20- Link layer
21- Client, Router, Server
22- Wireshark
Socket Tushunchalari
1- Socket
2- Socket nazariyasi
3- Application & System
4- Process, Application
5- Data Path & Channel
6- TCP (Reliable)
7- Connection Oriented
8- 3 way handshaking
9- 4 way handshaking
10- IP + Port (Unique)
11- IP + Port = Socket
12- UDP (Unreliable)
13- Socket dasturlash
14- Listening Socket: <TCP, IP, PORT>
15- Connected: <TCP, src IP, src PORT, dest IP, dest PORT>
16- Well-known ports (0~1023)
17- HTTP(80), HTTPS(443), DNS(53)
18- Registered ports (1024~49151)
19- MySQL(3306), Tomcat(8080)
20- Dynamic ports (49152~65535)
21- Nazariya va dasturlash
World Wide Web (WWW)
1- Tim Berners-Lee
2- CERN
3- World Wide Web
4- Birinchi brauzer
5- Birinchi server
6- Birinchi website
7- HTTP
8- HTTP so’rovlar
9- HTTP javoblar
10- Status kodlar
11- Cookie
12- Session
13- SSL/TLS
14- DNS
15- DNS darajalari
16- DNS so’rovlari
17- DNS yozuvlari
18- CDN
Axborot va Xavfsizlik
1- NIST
2- Xavfsizlik prinsiplari
3- Hujum turlari
4- Xakerlar va Krakerlar
5- Xavfsizlik tushunchalari
6- Xavfsizlik elementlari
7- Himoya choralari
8- Xavfsizlik turlari
9- Tarmoq, Tizim, Dastur
Tarmoq va Xavfsizlik
1- Tarmoq xavfsizligi
2- Firewall
3- WAF
4- IPS va IDS
5- Anti-DDoS
6- VPN
7- Tarmoq hujumlari
8- Sniffing, Spoofing, Session hijacking
9- DoS hujumlari
10- Ping of Death, TCP SYN Flooding
11- TearDrop, Land, Smurf
11- Skanerlash hujumlari
12 - TCP Scan, UDP Scan
Tizim va Xavfsizlik
1- Operatsion tizim
2- Bulutli hisoblash
3- On-Prem, IaaS, PaaS, SaaS
4- Tizim xavfsizligi
5- Parolni boshqarish
6- Akkauntni boshqarish
7 -Kirishni boshqarish
8- Vakolatni boshqarish
9- Loglarni boshqarish
10- Zaiflikni boshqarish
11- Shifrlash
12- Tizim hujumlari
13- Zararli dastur hujumi
14- Parolni buzish hujumi
15- Xavfsizlik teshiklari hujumi
16- Xizmatga nisbatan hujum
Dastur va Xavfsizlik
1- Veb-server va WAS
2- Veb zaifliklari
3- Zaiflikni tekshirish
4- CWE/SANS Top 25
5- OWASP Top 10
6- SDLC
7- MS SDL
8- Seven Touchpoints
9- CLASP
10- Xavfsizlikni tahlil qilish
11- Kirish ma’lumotlarini tekshirish
12- Xavfsizlikni loyihalash elementlari
13- Xatoliklarni qayta ishlash
14- Sessiyani nazorat qilish
15- Xavfsizlikni amalga oshirish
16- Kirish ma’lumotlarini tekshirish
17- Xavfsizlik funksiyalari
18- Xatolarni qayta ishlash
19- Inkapsulyatsiya
20- Qidiruv tizimlari
21- Shodan, SSLLabs
22- Proxy
23- Forward Proxy
24- Reverse Proxy
25- Proxy Tools