Ports to know for Security+

Roisin GleesonRoisin Gleeson
2 min read

If you are like me, the idea of learning off port numbers is quite daunting, and if you look at a list of them it seems like they are never ending and so similar that they can not be distinguished.

In my study I have broken them into categories and uses which is helping me to recognise them a bit more (I still have a long way to go!)

Web Traffic

PortProtocolUse
80HTTPUnencrypted web browsing
443HTTPSSecure web browsing (SSL/TLS)

Email Services

PortProtocolUse
25SMTPSending email (basic)
110POP3Receiving email (downloadable to device)
143IMAPReceiving email (keeps mail on server)
993IMAPSSecure IMAP
995POP3SSecure POP3

File Transfer

PortProtocolUse
20/21FTPFile transfer (unsecure)
22SFTPSecure file transfer (via SSH)
69TFTPLightweight file transfer (no authentication/ encryption)

Remote Access

PortProtocolUse
22SSHSecure remote access (command line)
23TelnetUnsecure remote access (avoid)
69RDPRemote desktop (Windows GUI Access)

Network Services

PortProtocolUse
53DNSDomain name resolution
67/68DHCPAssigning IP addresses
161SNMPNetwork monitoring
123NTPTime sync

Directory Services

PortProtocolUse
389LDAPDirectory lookups (AD)
636LDAPSSecure LDAP (encrypted)
0
Subscribe to my newsletter

Read articles from Roisin Gleeson directly inside your inbox. Subscribe to the newsletter, and don't miss out.

Written by

Roisin Gleeson
Roisin Gleeson

Hi, I’m Roisin, and this is my journey into cybersecurity. With a background in adult education, I’ve always enjoyed problem-solving and hands-on learning. Now, I’m applying that mindset to cybersecurity, where I’m exploring everything from ethical hacking to Python scripting. I’m currently working on my CompTIA Security+ certification, with plans to dive into CySA+ and PenTest+. I’m also learning Linux and building a portfolio of security projects to develop my skills. This blog is where I document my progress, challenges, and lessons learned—whether it’s breaking down security concepts, sharing Python scripts, or writing about real-world security issues. Follow along as I grow from learner to cybersecurity professional—one step at a time.