No se encontraron resultados.
No se encontraron resultados.
Basado en el curriculo oficial de Cisco NetAcad. Desbloquea niveles respondiendo correctamente. Cada respuesta correcta da XP; el nivel sube automaticamente.
The OSI model is the universal language of networking. Tap any layer to see its protocols, devices and real-world role. Data flows DOWN when sending, UP when receiving.
A typical enterprise network has multiple security zones. Click any device to learn its role, protocols and OSI layer.
Every system has an attack surface. Click an attack vector to see the kill chain and mitigations.
When you connect to any HTTPS site, an invisible cryptographic handshake happens in milliseconds. Click each step to understand what happens and why.
Defense in Depth: never rely on a single control. Each layer assumes the previous one failed. Click each layer to see tools, protocols and CIA triad impact.
STRIDE is Microsoft's threat modeling framework. Every component in a system can face any of these 6 threat categories. Click each threat to see examples, real attacks and mitigations.
The OSI model and TCP/IP model describe the same reality from different angles. OSI is the conceptual reference; TCP/IP is what actually runs on the internet. Hover over or tap any row to see the mapping.
| OSI LAYER | TCP/IP LAYER | KEY PROTOCOLS | DATA UNIT | SECURITY CONTROL |
|---|
Port numbers identify services on a host. Well-known ports (0-1023) are IANA-assigned. Click any row to see the protocol detail. Red = dangerous if exposed. Green = secure version.
| PORT | PROTO | SERVICE | USE | RISK |
|---|
Guia practica de protocolos de enrutamiento. IS-IS opera en capa 2 (sin IP), OSPF/EIGRP/BGP en capa 3. Cambia la vista para comparar protocolos, decidir cual usar, o verlos por capa OSI.
Arquitecturas de red desde la empresa clasica hasta Zero Trust y Cloud Hibrido. Cambia la vista para explorar cada modelo.