Mostrando 0 de 0
🔍

No se encontraron resultados.

Elige tu ruta de aprendizaje

Basado en el curriculo oficial de Cisco NetAcad. Desbloquea niveles respondiendo correctamente. Cada respuesta correcta da XP; el nivel sube automaticamente.

0 correctas
0 errores
0 racha
0 XP
Nivel 1 - Rookie
0 / 100 XP

The OSI model is the universal language of networking. Tap any layer to see its protocols, devices and real-world role. Data flows DOWN when sending, UP when receiving.

Sending: encapsulation (7 to 1) ↓  |  Receiving: decapsulation (1 to 7) ↑

A typical enterprise network has multiple security zones. Click any device to learn its role, protocols and OSI layer.

INTERNET DMZ INTERNAL NETWORK INTERNETBGP IPv4 IPv6 FIREWALLACL IPS NAT WEB SRVHTTPS WAF DNS SRVUDP 53 ROUTEROSPF BGP SWITCHMAC VLAN WiFi APWPA3 INT SRVSSH SMTP CLIENTSDHCP TCP IDS/IPSsnort
Select a device
Click any device above to see its role, protocols, OSI layer and security considerations.

Every system has an attack surface. Click an attack vector to see the kill chain and mitigations.

KILL CHAIN

When you connect to any HTTPS site, an invisible cryptographic handshake happens in milliseconds. Click each step to understand what happens and why.

Defense in Depth: never rely on a single control. Each layer assumes the previous one failed. Click each layer to see tools, protocols and CIA triad impact.

STRIDE is Microsoft's threat modeling framework. Every component in a system can face any of these 6 threat categories. Click each threat to see examples, real attacks and mitigations.

The OSI model and TCP/IP model describe the same reality from different angles. OSI is the conceptual reference; TCP/IP is what actually runs on the internet. Hover over or tap any row to see the mapping.

OSI LAYER TCP/IP LAYER KEY PROTOCOLS DATA UNIT SECURITY CONTROL

Port numbers identify services on a host. Well-known ports (0-1023) are IANA-assigned. Click any row to see the protocol detail. Red = dangerous if exposed. Green = secure version.

PORT PROTO SERVICE USE RISK

Guia practica de protocolos de enrutamiento. IS-IS opera en capa 2 (sin IP), OSPF/EIGRP/BGP en capa 3. Cambia la vista para comparar protocolos, decidir cual usar, o verlos por capa OSI.

Arquitecturas de red desde la empresa clasica hasta Zero Trust y Cloud Hibrido. Cambia la vista para explorar cada modelo.

Modo enfoque activo. Cada comando tiene un color por sistema operativo. Haz clic en cualquier card para ver ejemplos reales y notas. Usa la busqueda para filtrar por lo que necesitas ahora. El boton copiar copia el comando exacto al portapapeles.