🔐 What I Learned from TryHackMe’s “Networking: Secure Protocols” Module
As I continue building my foundation in cybersecurity, I recently worked through the "Networking: Secure Protocols" module on TryHackMe—and I have to say, it was incredibly helpful in breaking down how data can be securely transmitted across networks. This post is a quick summary of what I learned, from TLS and HTTPS to VPNs and secure file transfers.
✅ TLS: The Backbone of Secure Communication
The module kicked off with TLS (Transport Layer Security)—the protocol that encrypts most secure traffic on the internet. I used to hear about TLS and SSL interchangeably, but this cleared it up: TLS is the modern, secure version, while SSL is outdated and no longer safe.
One of the most valuable parts for me was understanding the TLS handshake—how the client and server agree on encryption methods and exchange keys securely. I also got to play around with openssl to inspect certificates and check what TLS versions and ciphers a site supports. Really cool hands-on learning.
🌐 HTTPS: More Than Just a Padlock
We all see the padlock in our browsers, but now I truly understand what it means. HTTPS is just HTTP over TLS, which ensures that the data we send to and receive from websites is encrypted and authenticated.
The module emphasized that HTTPS doesn't automatically mean a website is trustworthy—it just means the connection is secure. That distinction was eye-opening and something I’ll definitely keep in mind when analyzing web traffic or doing future security assessments.
📧 Securing Email with SMTPS, POP3S, and IMAPS
Before this, I didn’t know that email protocols like SMTP, POP3, and IMAP weren’t secure by default. I learned how they become secure when wrapped with TLS:
- SMTPS (Port 465) is used for securely sending emails.
- POP3S (Port 995) and IMAPS (Port 993) are used for securely retrieving them.
These ports and encrypted versions ensure that our emails (especially passwords) aren’t being transmitted in plain text. I’ll definitely be more mindful of this when configuring mail clients or reviewing email security in the future.
💻 SSH: My Go-To for Secure Remote Access
I’ve used SSH before for accessing remote servers, but I didn’t realize how much was going on under the hood. It provides encrypted remote access over port 22 and is also used for tunneling and even file transfers.
The module also emphasized key-based authentication, which is a safer alternative to using passwords. I practiced generating SSH key pairs and connecting securely without a password—which was both practical and empowering.
📂 Secure File Transfers: SFTP vs FTPS
File transfers are easy to overlook, but they can be risky if not done securely. I learned two main ways to do it right:
- SFTP is built into SSH and uses port 22. It’s simple, reliable, and fully encrypted.
- FTPS is FTP with TLS encryption. It’s a bit more complicated to configure (especially with firewalls and ports), but still widely used.
For most use cases, SFTP feels like the better choice—it’s easier to set up and integrates smoothly with SSH.
🌍 VPNs: Creating Secure Tunnels
Lastly, the module introduced VPNs, which allow users to create secure tunnels over insecure networks like the internet. I explored how VPNs encrypt traffic, mask IP addresses, and allow secure access to internal networks.
We used OpenVPN in the lab exercises, which gave me firsthand experience in connecting to a VPN and seeing how my traffic was routed. I also learned the differences between protocols like IPsec, WireGuard, and L2TP, which gave me a clearer picture of the options available in the real world.
🧠 Final Thoughts
This module was packed with useful knowledge that really brought together a lot of networking and security concepts I had only vaguely understood before. I now feel much more confident about:
- Identifying when and how protocols should be secured.
- Inspecting encrypted traffic and understanding what’s happening in the background.
- Choosing and implementing the right secure protocols in real-world scenarios.
If you're new to networking or trying to deepen your understanding of secure communications, I definitely recommend giving this TryHackMe module a go. It's hands-on, beginner-friendly, and super relevant for anyone in cybersecurity or IT.


