Practical Foundations in Cybersecurity
  • 🖌️Practical Foundations in Cybersecurity
  • 1. IT career planning
    • Introduction - IT career planning
    • IT career paths – everything you need to know
    • Job roles in IT and cybersecurity
    • How to break into information security
    • The Security Operations Center (SOC) career path
    • The GRC analyst role
    • How to get CCNA certification
    • Job search strategy
  • 2. Introduction to cybersecurity
    • Introduction - Introduction to cybersecurity
    • Foundational cybersecurity concepts and practices
    • The cybersecurity threat landscape
    • Common cyber attacks
    • Risk mitigation methods
    • Network security risk mitigation best practices
  • 3. Cybersecurity GRC
    • Introduction - Cybersecurity GRC
    • Cybersecurity GRC
  • 4. Networking fundamentals
    • Introduction - Networking fundamentals
    • How data flow through the Internet
  • 5. Wireless security and cryptography
    • Introduction - Wireless security and cryptography
    • SSL/TLS cryptography
    • Wireless network security
  • 6. Practical foundations in ethical hacking
    • Introduction - Practical foundations in ethical hacking
    • Ethical assessment of teaching ethical hacking
    • The ethical teaching of ethical hacking
    • Professional ethical hacking body of knowledge
      • The ethics of ethical hackers
      • The penetration testing process
      • What do ethical hackers do?
    • Who are ethical hackers?
  • 7. Conclusion
    • Introduction - Conclusion
    • Final words
Powered by GitBook
On this page
  • Chapter 4: Networking fundamentals
  • Topics covered in this chapter
  1. 4. Networking fundamentals

Introduction - Networking fundamentals

This chapter explains what happens when someone types www.google.com into a web browser

Chapter 4: Networking fundamentals

This chapter covers networking fundamentals by way of tracing the movement of a data packet from one host to another across the Internet - highlighting key network devices and network protocols involved, data encapsulation/de-encapsulation against the OSI model layers, and how switches and routers facilitate communication on the network.

This chapter will help students:

• Map networking protocols and devices to their functions and OSI model layers.

• Compare switches (intra-network) and routers (inter-network) in facilitating communication.

• Describe data encapsulation/de-encapsulation across OSI model layers.

• Understand what happens when someone types www.google.com into a web browser.

• Identify common network protocols (e.g., HTTP, TCP/IP, DNS) and their security implications.

• Relate network layers (OSI/TCP/IP models) to vulnerabilities and mitigation techniques.

Topics covered in this chapter

Network devices - including clients, servers, switches, routers, and firewalls - and their functions.

The Open Systems Interconnection (OSI) model layers and their role in data flow.

Host to host communication in networking (intra- and inter-network data flow).

How switches facilitate communication within a network (MAC tables and VLANs).

How routers facilitate communication between networks (routing and ARP tables, and subnets).

Network protocols and their functions (ARP, FTP, SMTP, HTTP, SSL, TLS, HTTPS, DNS, and DHCP).

Network layers within the OSI model in the context of vulnerability and mitigation (e.g., L1 sniffing, L2 ARP spoofing MITM, L3 ICMP flooding, L4 TCP SYN flooding, L5 session hijacking, L6 phishing, and L7 DNS spoofing).

PreviousIntroduction - Cybersecurity GRCNextHow data flow through the Internet

Last updated 10 days ago