Networks: IP ProtocolExplores the Internet Protocol (IP), BFS algorithm, routing tables, and IPv4 addresses.
Network Security: ARP SpoofingDelves into routing in LAN, ARP spoofing attacks, and defense strategies against them, emphasizing the risks of network vulnerabilities.
Monitoring with Icinga2Explores the monitoring of a new VM and the use of Icinga2 for critical alerts and incident management.