Penetration testing course: 0x02.3 Introduction to Computer Networks

“Humans are social animals” like Aristotle said and as such they need to communicate with each other. At the beginning there was only oral (verbal) and written communication, then thanks to the evolution of electronics and telecommunication systems humans were able to communicate with each other remotely by broadcasting messages via electrical or wireless signals. We’ve seen the introduction of the radio, the television, landline and mobile telephony, then the internet and the world underwent a significant change. For instance without such technologies you wouldn’t be able to read this article written by an Italian guy who is currently living in the UK and is making his website accessible by anyone across the world.

Computer Networking

Computer Networking


A computer network is a group of devices (not necessarily “computers” but literally any electronic device [IoT]) connected to each other, able to communicate, to send and receive information.  Usually devices use electromechanical systems to generate, broadcast and receive a signal that is analog (a continuos stream of information) and then is converted to digital (using an I/O interface with a signal transducer and a discrete mathematical algorithm for its digital representation) in order to be processed electronically.

function of computer networks

function of computer networks

Networks and connections like mathematical relations can be 1:1, 1:many or many:many, they can be synchronous, asynchronous or realtime, they need a network hardware and a transmission protocol that allow the transmission of data, not as a whole but in the form of chunks of data or fragments called network packets. We’ll see these things and much more in the following articles.

A good networking foundation is essential for the wannabe ethical hacker / pentester, so we’ve got you covered. As I always emphasize in the course, you’ll need to put in extra effort and do your personal research in order to become a good IT Security Professional but the path to become an expert is long and arduous, so you won’t disdain a minimal guidance.

Did you enjoy this article?
Signup today and receive free updates straight in your inbox. We will never share or sell your email address.
I agree to have my personal information transfered to MailChimp ( more information )

Author: Fabio Baroni   Date: 2016-02-10 18:27:18

Comments 4

  1. You caught my attention. I’m looking forward to reading the next articles about computer networks!
    Great job! Keep up the good work!


    1. Post

      Thank you Irwin! I love reading about satisfied visitors. I get no money for writing these articles. I love sharing my great passion for Information Security with all of you! Let me know if you have any questions.


  2. Hello Fabio,

    Thank you for writing these articles for free. I have been looking for documentation to read and tutorials to watch and follow for some time now. It’s nice to see someone taking the time to teach basics (and above the basics) to newbies like me. I’m looking forward to your following posts.


    1. Post

      You are welcome 🙂 This article is just the introduction to the series about computer networks that I will publish. All these topics are the prerequisites to know before delving into the ethical hacking study. It takes some time, but I’m trying to teach things step by step during my free time, rather than jumping immediately into advanced topics that may be difficult for beginners.
      I’ll be glad to speak to you again. If you have any question just ask here or drop me a message at

Leave a Reply

Your email address will not be published.