Practical Foundations in Cybersecurity
  • πŸ–ŒοΈPractical Foundations in Cybersecurity
  • 1. IT career planning
    • Introduction - IT career planning
    • IT career paths – everything you need to know
    • Job roles in IT and cybersecurity
    • How to break into information security
    • The Security Operations Center (SOC) career path
    • The GRC analyst role
    • How to get CCNA certification
    • Job search strategy
  • 2. Introduction to cybersecurity
    • Introduction - Introduction to cybersecurity
    • Foundational cybersecurity concepts and practices
    • The cybersecurity threat landscape
    • Common cyber attacks
    • Risk mitigation methods
    • Network security risk mitigation best practices
  • 3. Cybersecurity GRC
    • Introduction - Cybersecurity GRC
    • Cybersecurity GRC
  • 4. Networking fundamentals
    • Introduction - Networking fundamentals
    • How data flow through the Internet
  • 5. Wireless security and cryptography
    • Introduction - Wireless security and cryptography
    • SSL/TLS cryptography
    • Wireless network security
  • 6. Practical foundations in ethical hacking
    • Introduction - Practical foundations in ethical hacking
    • Ethical assessment of teaching ethical hacking
    • The ethical teaching of ethical hacking
    • Professional ethical hacking body of knowledge
      • The ethics of ethical hackers
      • The penetration testing process
      • What do ethical hackers do?
    • Who are ethical hackers?
  • 7. Conclusion
    • Introduction - Conclusion
    • Final words
Powered by GitBook
On this page
  1. 4. Networking fundamentals

How data flow through the Internet

This chapter explains what happens when someone types www.google.com into a web browser

PreviousIntroduction - Networking fundamentalsNextIntroduction - Wireless security and cryptography

Last updated 7 months ago

This chapter constitutes an introduction to the topic of computer networking, emphasizing breadth over depth. This chapter is the perfect introduction to computer networking, coming at the topic from a practical angle.

This chapter is based on the YouTube playlist β€œβ€ by Ed Harmoush, a Network Engineer and YouTuber based in Seattle, WA, U.S. ().

If you’re looking to become a Network Engineer there is no better start to that journey than this video series. And if you’re in any other IT or tech role then now you have a better idea of what it is those networking folks do all day. β€”

After completing the seven lessons of this chapter/module, you will be able to explain what happens when someone types www.google.com into a web browser.

Topics covered

There are seven lessons in this module.

– Lesson 1

Key concepts discussed in this post include hosts, IP addresses, networks, repeaters, hubs, bridges, switches, and routers.

Learning objectives

  • Understand what hosts are

  • Understand the designations of client and server

  • Understand what IP addresses are and their hierarchical nature

  • Understand what is a network

  • Define network devices

  • Understand the functions of repeaters, hubs, bridges, switches, and routers

– Lesson 2

Key concepts discussed in this post include the OSI model Physical layer, Data Link layer, Network layer, Transport layer, Session layer, Presentation layer, Application layer, and data encapsulation/de-encapsulation.

Learning objectives

  • Understand what is the OSI model

  • List the layers of the OSI model and describe their functions

  • Understand the types of network devices that operate at each layer of the model

  • Know what protocols operate at each layer of the model

  • Understand the addressing schemes of layers 2, 3, and 4

Key concepts discussed in this post include the Address Resolution Protocol (ARP), how hosts in the same network communicate, and how hosts in different networks communicate.

Learning objectives

  • Understand how ARP resolves IP addresses to MAC addresses

  • Understand how hosts in the same network send and receive data

  • Understand how hosts in different networks communicate over the wire

Key concepts discussed in this post include the MAC address table, the four functions of switches (learning, flooding, forwarding, and filtering), unicast vs broadcast frames, and daisy chain switch typology.

Learning objectives

  • Understand how switches use the MAC address table

  • Understand how switches perform their functions

  • Understand how unicast flooding is different from a broadcast

  • Understand what are VLANs

  • Understand how switches operate when there are multiple switches involved

Key concepts discussed in this post include the difference between a router and a host, the routing table, the ARP table, and hierarchical network topology.

Learning objectives

  • Understand the difference between a router and a host

  • Understand how a routing table can be populated with routes

  • Understand how routers use their routing tables and ARP tables to move packets across the Internet

  • Understand why you would want to deploy your routers in a hierarchy

Key concepts discussed in this post include the TCP/IP model, and the functions of the network protocols ARP, FTP, SMTP, HTTP, SSL, TLS, HTTPS, DNS, and DHCP.

Learning objectives

  • Understand what are network protocols

  • Understand how the TCP/IP model maps to the OSI model

  • List and describe the four parameters every host needs to achieve Internet connectivity

  • Understand the roles of the DHCP protocol and the DNS protocol in Internet communication

  • Describe the functions of the network protocols ARP, FTP, SMTP, HTTP, SSL, TLS, and HTTPS

Learning objectives

  • Explain the steps involved in transmitting a packet from one endpoint to another across the Internet

  • Understand how the MAC address, ARP, and routing tables facilitate data flow through a network

– Lesson 3

– Lesson 4

– Lesson 5

– Lesson 6

– Lesson 7

Networking Fundamentals
Practical Networking
Ed Harmoush (Sep 13, 2021)
Network devices and their functions
The Open Systems Interconnection (OSI) Model
Host to host communication in networking
How switches facilitate communication within a network
How routers facilitate communication between networks
Network protocols and their functions
When you type www.google.com into a browser