- TCP/IP
- Protocols
- Network Adapter
- Local Area Network (LAN)
- Wide Area Network (WAN)
- Peer-to-peer
- Client-Server
- Network Topologies
- Bus
- Star
- Ring
- Token Ring
- Mesh
- Full Mesh
- Hybrid
- Point-to-multipoint
- Network cables
- coaxial
- twisted-pair
- fiber-optic
- Electro-Magnetic Interference (EMI)
- Megabits per second (Mbps)
- Gigabits per second (Gbps)
- Megabytes per second (MBps)
- Gigabytes per second (GBps)
- Baseband
- Shielded Twisted Pairs (STP)
- Unshielded Twisted Pairs (UTP)
- RJ-45
- CAT5, 5E, 6 cabling
- Single-mode
- Multimode
- Wave Division Multiplexing (WDM)
- Multimode Fiber-Optic
- Wireless Access Point (WAP)
- Service Set Identifier (SSID)
- Wireless Frequency Ranges
- Hertz
- Data Transmission Methods
- Baseband
- Broadband
- Data signaling methods
- Digital
- Analog
- Half-duplex
- Full-duplex
- IEEE 802
- IEEE 802.3
- IEEE 802.11
- Transoceanic Cable
- Digital Signal 1
- E-carrier
- Optical Carrier transmission rates
- Digital Subscriber Line (DSL)
- Asymmetric DSL (ADSL)
- Symmetric DSL (SDSL)
- Very High Bitrate DSL (VDSL)
- Asynchronous Transfer Mode
- Synchronous Optical Network (SONET)
- Geostationary orbit
- Elliptical/Non-Geostationary orbit
- footprint
- Very Small Aperture Terminal (VSAT)
- TCP/IP Protocol Suite
- International Organization for Standardization (ISO)
- ISO Model
- Protocol Data Unit (PDU)
- Application Programming Interfaces
- Network Interface Card (NIC)
- Repeaters
- Hubs
- Switches
- Routers
- Unicast
- Multicast
- Broadcast
- Anycast
- Media Access Control (MAC) address
- Organizationally Unique Identifier (OUI)
- Internet Protocol (IP) address
- IP Network Part
- IP Host Part
- Subnet Mask
- Classless Interdomain Routing (CIDR)
- Variable-Length Subnet Masking (VLSM)
- Subnetting
- Supernetting
- IP Classes
- Private IP ranges
- Automatic Private IP Addressing (APIPA)
- Address Resolution Protocol (ARP)
- ARP cache
- Reverse Address Resolution Protocol (RARP)
- IP Broadcast address
- MAC Broadcast address
- Network Address Translation (NAT)
- Static NAT
- Dynamic NAT
- Port Address Translation (PAT)
- Ports
- Internet Protocol Version 6 (IPv6)
- Internet Protocol Security (IPsec)
- Internet Assigned Numbers Authority (IANA)
- Route Aggregation
- Dual stacking
- Translation
- Tunneling
- Neighbor Discovery Protocol (NDP)
- Internet Control Message Protocol (ICMP)
- ICMPv6
- Transmission Control Protocol (TCP)
- Three-way handshake
- TCP flags
- User Datagram Protocol (UDP)
- Ports
- Well-Known Ports
- Registered Ports
- Ephemeral Ports
- Socket
- Dynamic Host Configuration Protocol (DHCP)
- DORA Process
- Domain Name System (DNS)
- Root name servers
- Top-Level Domains (TLDs)
- Generic TLD (gTLD)
- Sponsored TLD (sTLD)
- Country Code TLD (ccTLD)
- Brand gTLD
- Top-Level Domains (TLDs)
- Fully Qualified Domain Name (FQDN)
- Absolute domain name
- DNS Resource Records
- DNS Queries
- Iterative
- Recursive
- DNS Forwarder
- DNS Caching
- Zone Transfers
- Simple Mail Transport Protocol (SMTP)
- Post Office Protocol version 3 (POP3)
- Internet Message Access Protocol version 4 (IMAP4)
- Hypertext Transfer Protocol (HTTP)
- Uniform Resource Locator (URL)
- Hypertext Transfer Protocol Secure (HTTPS)
- Secure Sockets Layer (SSL)
- Transport Layer Security (TLS)
- File Transfer Protocol (FTP)
- Active Mode
- Passive Mode
- Secure Shell (SSH)
- Diffie-Hellman key exchange
- Lightweight Directory Access Protocol (LDAP)
- Supervisory Control and Data Acquisition (SCADA)
- Virtual Local Area Network (VLAN)
- Virtual Private Network (VPN)
- Cloud
- Amazon Web Services (AWS)
- Azure
- Google Cloud
- IBM Cloud
- Digital Ocean
- Public Cloud
- Private Cloud
- Community Cloud
- Hybrid Cloud
- Software as a Service (SaaS)
- Platform as a Service (PaaS)
- Infrastructure as a Service (IaaS)
- CIA Triad
- Information Assurance (IA)
- Network security
- Network Threats
- Uninterruptible power supply (UPS)
- Redundant array of inexpensive disks (RAID)
- Physical Access
- Logical Access
- Remote Access
- Malicious Software (Malware)
- Virus
- Worm
- Trojan
- Rootkit
- Bootkit
- Adware
- Spyware
- Ransomware
- Social Engineering
- Phishing
- Spear Phishing
- Whaling
- Denial of Service (DoS)
- Distributed Denial of Service (DDoS)
- Firewalls
- Host-based
- Network-based
- Intrusion Detection Systems (IDS)
- Host-based
- Network-based
- Intrusion prevention systems (IPS)