Chapter 2. Solutions in this chapter:

  • 50,000 Foot View of the OSI Model
  • Using the OSI Model to Troubleshoot
  • Applying the OSI Model to Forensics
  • Summary
  • Solutions Fast Track
  • Frequently Asked Questions

Introduction

As the title states, this is the OSI model chapter. If you've been in the technical field and read any technical books, you've probably noticed this topic is in many of them. Let me stop you now before you skip over this chapter. This chapter will be different from the typical certification/technical books that are out there. I'll be honest; I personally hate reading the OSI model chapters in the books I have read. It's the first chapter that I want to skip over, so I'm designing this chapter to show you there is an interesting side ...

Get Next Generation SSH2 Implementation now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.