- Hypertext transport protocol is an…application layer protocol for the web.…HTTP uses TCP as the transport layer protocol.…We're gonna focus on HTTP version 1.1,…it is the most widely used.…In this graphic, as we've seen before,…we see on the left-hand side the TCP/IP model,…on the right-hand side we see the OSI model.…Then within the center we see protocols and services.…
We see here that HTTP is in the application layer.…There are two types of HTTP messages;…requests from a client, and then a response.…Now a web page consists of objects.…Those objects can be something like the images,…the HTML file itself, and JavaScript.…Now we want to ensure that we get all of those objects,…so that your web page can be rendered correctly.…HTTP is a stateless protocol,…meaning the server maintains no information…about past client requests.…
An HTTP request message begins with a request line,…indicates GET or POST method,…a Uniform Resource Identifier, or URI.…This is different from the URL, or Uniform Resource Locator,…in that a URI indicates where on the page you'll find…
Author
Updated
11/9/2016Released
4/16/2015- Exploring the Wireshark interface
- Using display and capture filters
- Dissecting the OSI model
- Analyzing TCP, IPv4, and other protocols
- Detecting denial-of-service attacks and password attacks
- Using security tools for ethical hacking
Skill Level Intermediate
Duration
Views
Q: Where can I download the exercise files?
A: You can download some of the exercise files from lynda.com for this course. Others are available for download from other sources. Watch the video titled “Downloading the exercises files” for more information on downloading each external file.
Related Courses
-
Introduction
-
Welcome1m 11s
-
-
1. Traffic Capture and Analysis
-
Traffic capture overview2m 32s
-
Managing capture options3m 28s
-
-
2. Review of the Open Systems Interconnection (OSI) Model
-
Dissecting the OSI model3m 35s
-
-
3. Deep Packet Analysis of Common Protocols
-
Analyzing TCP4m 1s
-
Exploring IPv46m 11s
-
Discovering HTTP6m 46s
-
Mastering DNS6m 14s
-
Grasping UDP6m 48s
-
Examining FTP6m 49s
-
Dissecting ICMP10m 32s
-
-
4. Normal and Abnormal Behavior
-
5. Common Attack Signatures
-
Identifying network scans2m 25s
-
Examining macof attacks6m 33s
-
6. Security Tools
-
Conclusion
-
Next steps36s
-
- Mark as unwatched
- Mark all as unwatched
Are you sure you want to mark all the videos in this course as unwatched?
This will not affect your course history, your reports, or your certificates of completion for this course.
CancelTake notes with your new membership!
Type in the entry box, then click Enter to save your note.
1:30Press on any video thumbnail to jump immediately to the timecode shown.
Notes are saved with you account but can also be exported as plain text, MS Word, PDF, Google Doc, or Evernote.
Share this video
Embed this video
Video: Discovering HTTP