S3SS10N Wednesday – Network Programming

Join Cybrary

Begin Learning Cyber Security for FREE Now!

FREE REGISTRATION
Already a Member Login Here
< Back to S3SS10NS

S3SS10N Wednesday – Network Programming

Published: October 5, 2016 | By: John Foster | Views: 7100
save
This post has been saved to your profile

This Weeks S3SS10N Wednesday


This session covers network programming which revolves around sockets and protocols. A socket is a computer’s physical connection point. Every socket has an address and protocol, which is the agreed upon communication path between two machines. Network programming involves two protocols: TCPIP or UDP. Participants learn examples of codes for two different programs so the two machines can be set up to talk to each other. One of these is a client program and the other is the server program.

Whiteboard Notes

Click Image to View a Larger Version
< Back to S3SS10NS

About This S3SS10N Wednesday's Contributor

John Foster
John Foster is a security researcher and do-er of things for Point3 Security. . He has a degree in Information Systems from Shippensburg University and an MBA from Texas A&M - Commerce. He worked previously at the United States Navy and the Pentagon, doing cyber-y things. He currently teaches cyber operations and reverse engineering for the DoD.
Enjoy this S3SS10N Wednesday? Want more Cybytes?
Invite a Friend
and share now
Facebook Twitter LinkedIn Email
Join Cybrary
10 Comments
  1. Thankful for been part of this.
    Needs more of ThIs.

  2. Good one. Thank You John Foster

Page 2 of 2«12
Comment on This

You must be logged in to post a comment.

Our Revolution

We believe Cyber Security training should accessible for everyone, everywhere. Everyone deserves the OPPORTUNITY to learn, begin and grow a career in this fascinating field. Therefore, Cybrary is the world's largest community where people, companies and training come together to give everyone the ability to collaborate in an open source way that is revolutionizing the cyber security educational experience.

We recommend always using caution when following any link

Are you sure you want to continue?

Continue
Cancel