Did you know Cybrary has FREE video training? Join more than 2,500,000 IT and cyber security professionals, students, career changers, and more, growing their careers on Cybrary.
Now that you've learned about how the hardware functions and about logical addressing, we look at what happens at layer 3, and how IP works. We'll discuss the most exploited Protocol and how that happens. You'll learn about mapping traffic to see what type of traffic comes in and how much traffic goes out and why that's important, and we'll examine pings, define how spoofing works and mitigating strategies for these types of attacks.