Computer Networking
23h 58m 29s
English
Paid
Course description
The Internet - along with all the applications it supports, such as the web - has become one of the most significant driving forces of technological progress in our time.
In this course, we will examine the key protocols that enable the operation of the internet, the web, and other applications in the field of computer networks. This will give you the opportunity not only to utilize modern networking technologies to their fullest potential but also to contribute to their development in the future.
Watch Online
0:00
/ #1: 001 Shout server
All Course Lessons (61)
| # | Lesson Title | Duration | Access |
|---|---|---|---|
| 1 | 001 Shout server Demo | 14:15 | |
| 2 | 002 HTTP header server | 27:07 | |
| 3 | 003 Simple DNS client | 50:43 | |
| 4 | 004 The life of a packet (aka what happens when) | 01:00:24 | |
| 5 | 005 What is a socket | 12:33 | |
| 6 | 006 What do we mean by network layers (OSI model) | 13:57 | |
| 7 | 007 What is a system call (high level explanation) | 01:44 | |
| 8 | 008 Why packets typically have an MTU of (ie size of up to) 1500 bytes | 04:15 | |
| 9 | 009 Postels law | 01:20 | |
| 10 | 010 What does it mean to bind to a port | 03:54 | |
| 11 | 011 How do I know what socket system calls a library is making | 04:50 | |
| 12 | 012 The many differences between TCP and UDP | 04:41 | |
| 13 | 013 Latency vs throughput | 08:14 | |
| 14 | 014 A quick tour of netcat | 02:44 | |
| 15 | 015 What is the loopback interface (ie localhost) | 01:36 | |
| 16 | 016 HTTP proxy basic proxying | 50:55 | |
| 17 | 017 HTTP proxy persistent connections | 01:33:25 | |
| 18 | 018 HTTP proxy concurrency | 01:19:54 | |
| 19 | 019 HTTP proxy features | 01:15:22 | |
| 20 | 020 A brief overview of HTTP2 | 23:02 | |
| 21 | 021 A brief history of how HTTP and browsers came to be | 12:07 | |
| 22 | 022 Proxies gateways and tunnels | 09:06 | |
| 23 | 023 Understanding HTTP headers and answering your own questions | 22:16 | |
| 24 | 024 Using the setsockopt system call | 07:51 | |
| 25 | 025 The motivation and implementation of HTTP persistent connections | 08:49 | |
| 26 | 026 DNS client message compression | 38:34 | |
| 27 | 027 DNS client reverse DNS | 18:09 | |
| 28 | 028 DNS client more record types | 01:09:19 | |
| 29 | 029 DNS client tracing resolution | 01:07:38 | |
| 30 | 030 Hostnames before DNS a single HOSTSTXT file | 09:29 | |
| 31 | 031 How do programs know which DNS server to use | 05:15 | |
| 32 | 032 The structure of a hostname | 04:15 | |
| 33 | 033 Understanding DNS zones and zone transfers | 06:29 | |
| 34 | 034 DNS classes 65535 alternatives to the internet | 03:34 | |
| 35 | 035 How recursive resolvers can be used in reflection attacks | 09:12 | |
| 36 | 036 What is the TTL in DNS and was it a good idea | 09:49 | |
| 37 | 037 Root TLD and other authoritative name server roles | 18:44 | |
| 38 | 038 Lossy download | 39:25 | |
| 39 | 039 Reliable transport | 01:27:03 | |
| 40 | 040 How does TCP compute its timeout interval | 19:40 | |
| 41 | 041 Whats the big idea behind QUIC | 15:17 | |
| 42 | 042 Did Van Jacobson save the internet (Anoverview of congestion control) | 17:33 | |
| 43 | 043 The basic difference between flow control and congestion control | 05:46 | |
| 44 | 044 The motivation behind TCP sliding window | 09:53 | |
| 45 | 045 Whats the purpose of the TCP handshake | 08:57 | |
| 46 | 046 How the initial sequence number (ISN) is chosen in TCP | 09:40 | |
| 47 | 047 How TCP provides reliable delivery | 31:09 | |
| 48 | 048 Flow control and buffering in TCP a demonstration | 29:01 | |
| 49 | 049 Traceroute | 01:03:49 | |
| 50 | 050 Traceroute autonomous systems | 45:40 | |
| 51 | 051 Traceroute ICMP probes | 30:55 | |
| 52 | 052 Traceroute customization | 01:09:07 | |
| 53 | 053 An overview of traceroute ping and mtr | 18:46 | |
| 54 | 054 Why the time to live in IPv4 is essentially a hop count | 05:46 | |
| 55 | 055 What exactly is a private IP address | 05:14 | |
| 56 | 056 Autonomous systems and the structure of the internet | 10:52 | |
| 57 | 057 Understanding CIDR subnets | 14:16 | |
| 58 | 058 The major differences between IPv4 and IPv6 | 11:33 | |
| 59 | 059 How routers decide how to forward a packet | 11:47 | |
| 60 | 060 The basic idea behind NAT | 13:33 | |
| 61 | 061 The difference between fragmentation and segmentation | 08:16 |
Unlock unlimited learning
Get instant access to all 60 lessons in this course, plus thousands of other premium courses. One subscription, unlimited knowledge.
Learn more about subscriptionComments
0 commentsWant to join the conversation?
Sign in to commentSimilar courses
LLM Engineer's Handbook
Sources: Paul Iusztin, Maxime Labonne
Artificial intelligence is experiencing rapid development, and large language models (LLMs) play a key role in this revolution. This book offers...
Build Side Projects With 500k+ Users: Coming Up With An Idea
Sources: Alex Chiou
You spent 50+ hours refining your resume and LinkedIn profile. Sent out over 1000 job applications. But despite all the effort, invitations for...
2 hours 14 minutes 19 seconds
CodeBreakthrough Vault
Sources: Caleb Curry
CodeBreakthrough Vault is an exclusive course designed to elevate you to a new level in your life and engineering career. Previously, this knowledge and...
62 hours 23 minutes 45 seconds
Web Security & Bug Bounty Learn Penetration Testing in 2023
Sources: zerotomastery.io
Start a career or earn a side income by becoming a Bug Bounty Hunter. No experience needed. Hack websites, fix vulnerabilities, improve web security and much mo
10 hours 28 minutes 11 seconds