1/459
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced | Call with Kai |
|---|
No analytics yet
Send a link to your students to track their progress
FTP (File Transfer Protocol)
Port 20 (Data), Port 21 (Control) - TCP. Port 21 is for control/commands while 20 is used to transfer files.
SSH (Secure Shell)
Port 22 - TCP. Designed to transmit data through a remote connection securely.
SFTP (SSH File Transfer Protocol)
Port 22 - TCP. A completely separate protocol from FTP that uses SSH to encrypt file transfers.
SMTP (Simple Mail Transfer Protocol)
Port 25 - TCP. Internet mail protocol used to send outgoing mail from email clients to mail servers.
TACACS+
Port 49 - TCP. Cisco proprietary protocol used for authentication, authorization, and accounting (AAA) services.
DNS (Domain Name System)
Port 53 - UDP. Used to associate IP addresses with domain names.
DHCP (Dynamic Host Configuration Protocol)
Ports 67/68 - UDP. Used to assign multiple local private IP addresses from one public IPv4 address.
HTTP (Hypertext Transfer Protocol)
Port 80 - TCP. Protocol used for websites and most internet traffic.
Kerberos
Port 88 - TCP/UDP. Network authentication protocol that allows for communication over a non-secure network using tickets.
POP3 (Post Office Protocol v3)
Port 110 - TCP. E-mail protocol that allows e-mail clients to communicate with e-mail servers (one-way).
NTP (Network Time Protocol)
Port 123 - UDP. Low latency protocol used to synchronize timekeeping across a network.
NetBIOS / SMB
Port 139 - UDP. Windows proprietary protocol built on NetBIOS. Allows users to remotely access servers.
IMAP (Internet Message Access Protocol)
Ports 143, 993 - TCP. E-mail protocol used to communicate with e-mail servers. Provides two-way communication.
SNMP (Simple Network Management Protocol)
Ports 161/162 - UDP. Protocol used to monitor and manage network devices on IP networks.
LDAP (Lightweight Directory Access Protocol)
Port 389 - UDP. Used to manage and communicate with directories.
HTTPS (Hypertext Transfer Protocol Secure)
Port 443 - TCP. Secure version of HTTP that used TLS for encryption.
SSTP (Secure Socket Tunneling Protocol)
Port 443 - TCP. Microsoft developed technology to replace PPTP or L2TP/IPSec. Uses TLS.
SMB (Server Message Block)
Port 445 - TCP. Windows proprietary protocol. Modern versions use port 445 and TCP to remotely access servers.
IPsec (using ISAKMP)
Port 500 - UDP. Internet Security Association and Key Management Protocol used for secure communication.
SMTPS (Simple Mail Transfer Protocol Secure)
Port 587 - TCP. The secure version of SMTP. Uses TLS for encryption.
LDAPS (Lightweight Directory Access Protocol Secure)
Port 636 - TCP. Secure version of LDAP that uses TLS for encryption.
FTPS (File Transfer Protocol Secure)
Ports 989/990 - TCP. FTPS uses TLS for encryption.
IMAPS (Internet Message Access Protocol Secure)
Port 993 - TCP. Secure version of IMAP that uses TLS for encryption.
POP3S (Post Office Protocol 3 Secure)
Port 995 - TCP. Secure version of POP that uses TLS for encryption.
RADIUS
Ports 1812, 1813 - UDP. Used to provide AAA for network services.
RDP (Remote Desktop Protocol)
Port 3389 - TCP. Windows proprietary protocol that enables remote connections to other computers.
Diameter
Port 3868 - TCP. Developed as an upgrade to Radius.
SRTP (Secure Real Time Protocol)
Port 5004 - UDP. SRTP replaced RTP and is a protocol used to stream audio and video communication.
L2TP (Layer 2 Tunneling Protocol)
Port 1701 - UDP. Used to create point to point connections like VPNs over UDP. Needs IPsec for encryption.
PPTP (Point to Point Tunneling Protocol)
Port 1723 - TCP/UDP. Based on PPP. Deprecated protocol for VPNs.
AAA
Authentication, Authorization, and Accounting
ACL
Access Control List
AES
Advanced Encryption Standard
AES-256
Advanced Encryption Standards 256-bit
AH
Authentication Header
AI
Artificial Intelligence
AIS
Automated Indicator Sharing
ALE
Annualized Loss Expectancy
AP
Access Point
API
Application Programming Interface
APT
Advanced Persistent Threat
ARO
Annualized Rate of Occurrence
ARP
Address Resolution Protocol
ASLR
Address Space Layout Randomization
ATT&CK
Adversarial Tactics, Techniques, and Common Knowledge
AUP
Acceptable Use Policy
AV
Antivirus
BASH
Bourne Again Shell
BCP
Business Continuity Planning
BGP
Border Gateway Protocol
BIA
Business Impact Analysis
BIOS
Basic Input/Output System
BPA
Business Partners Agreement
BPDU
Bridge Protocol Data Unit
BYOD
Bring Your Own Device
CA
Certificate Authority
CAPTCHA
Completely Automated Public Turing Test to Tell Computers and Humans Apart
CAR
Corrective Action Report
CASB
Cloud Access Security Broker
CBC
Cipher Block Chaining
CCMP
Counter Mode/CBC-MAC Protocol
CCTV
Closed-circuit Television
CERT
Computer Emergency Response Team
CFB
Cipher Feedback
CHAP
Challenge Handshake Authentication Protocol
CIA
Confidentiality, Integrity, Availability
CIO
Chief Information Officer
CIRT
Computer Incident Response Team
CMS
Content Management System
COOP
Continuity of Operation Planning
COPE
Corporate Owned, Personally Enabled
CP
Contingency Planning
CRC
Cyclical Redundancy Check
CRL
Certificate Revocation List
CSO
Chief Security Officer
CSP
Cloud Service Provider
CSR
Certificate Signing Request
CSRF
Cross-site Request Forgery
CSU
Channel Service Unit
CTM
Counter Mode
CTO
Chief Technology Officer
CVE
Common Vulnerability Enumeration
CVSS
Common Vulnerability Scoring System
CYOD
Choose Your Own Device
DAC
Discretionary Access Control
DBA
Database Administrator
DDoS
Distributed Denial of Service
DEP
Data Execution Prevention
DES
Digital Encryption Standard
DHCP
Dynamic Host Configuration Protocol
DHE
Diffie-Hellman Ephemeral
DKIM
DomainKeys Identified Mail
DLL
Dynamic Link Library
DLP
Data Loss Prevention
DMARC
Domain Message Authentication Reporting and Conformance
DNAT
Destination Network Address Translation
DNS
Domain Name System
DoS
Denial of Service
DPO
Data Privacy Officer
DRP
Disaster Recovery Plan