Time
41 minutes
Difficulty
Intermediate
CEU/CPE
1

Video Transcription

00:00
Hello. My name is Dustin and welcome to networking. Let's go ahead and go over a few of the most common network devices that you will encounter. The 1st 1 we've got is our router. These operate at layer three of the O S I model, meaning they focus on I p addressing routing and fording packets to their destination
00:20
in your home. A router may perform many more duties,
00:23
like working as a D H C P Server and handing out those I P addresses
00:29
to all the devices on your network.
00:31
Most modern home routers also have wireless capabilities as well.
00:37
Honor Slide. Here We've got a typical router icon that you will see in many network maps.
00:46
Next, we've got a typical layer to switch these operate at. You guessed it layer to meaning. They focus on Mac addresses of devices switches, make fording decisions based on known Mac addresses and compute perform basic filtering on frames.
01:04
There are two types of switches you may encounter, managed or unmanaged
01:10
a man. It's which allows you to configure settings and these air typically found in most medium to large size enterprises, unmanaged switches come ready to go out of the box and for the most part, are not configurable. You'll usually find these in homes or small home offices.
01:27
It should also be noted that there are layer three switches that do perform some routing functions out, as well as their typical Layer two functions.
01:41
One of the most important security devices you'll find on an enterprise network is a firewall.
01:47
These typically work at layers three and four, but can operate up to the application layer. Layer seven making decisions based on application layer protocols.
01:57
Fire will separate your internal networks from the Internet.
02:02
Firewalls can monitor incoming and outgoing network traffic and make decisions on whether to allow or block that traffic to find. Based on a defined set of security rules, these air typically the first line defense in your network.
02:21
There are several types of firewalls, including proxy firewalls, which serve as a gateway from one network to another. For a specific application.
02:30
There's a state full inspection firewalls,
02:34
typically your standard or traditional firewall,
02:37
and these allow our block traffic based on connection State Port and protocol,
02:43
Unified Threat Management, or you TM firewalls
02:46
provide normal firewall functions, plus intrusion prevention and anti virus.
02:53
The last type of firewall we're going to mention in this module are N g F de Pughs or next generation firewalls. These are becoming more and more common and provide much more functions than your typical packet filtering firewall.
03:07
And again, we were showing the typical firewall icon that you'd see any network map
03:15
needs or network intrusion to text in system.
03:21
These monitor traffic in on the network in real time or as close to real time as possible, and can alert if they spot any malicious traffic.
03:31
These devices require human interaction to make decisions whether or not to stop that malicious traffic
03:39
the way these devices work. They typically have one server and several sensors placed in strategic areas around the network
03:47
because needs only need to alert on traffic there typically placed out of band, which means their place out of the line of traffic and receive a copy of the traffic.
04:00
Because they're out of band, you won't see any network performance issues
04:06
nips network intrusion prevention system. These are similar to mids, the examined network traffic to detect malicious traffic, although they have one very big advantage in the acronym, you probably saw the prevention system versus detection so they actually have the ability to stop the malicious traffic
04:26
rather than just alerting on it
04:29
because they do have the ability to stop or change traffic. These devices need toe be placed in the band of traffic, so typically they will sit behind a firewall and watch for anything that may be deemed malicious.
04:44
Because these devices are in band, they may affect network performance depending on the rules. And there's a lot of other factors that could affect the network performance within ends. Start nips
04:59
in this module We went over a lot of information, including networked apologies and basic ports and protocols. You should know. We also discussed the seven Layer OS I model and how it differs from the newer four layer T C P I. P model. We went over some basic NETWORKINGS
05:16
skills, like sub netting I P addressing
05:19
and some basic troubleshooting tips and tools you may use.
05:24
Last thing we went over some standard network devices, including firewalls, routers, switches and the differences between network intrusion detection systems and network intrusion prevention systems.
05:38
In the next model, we're going to discuss the, uh, Marce off Windows operating system and security related to that.
05:46
But first, we have a quick quiz.
05:49
Question one. Nick is designing the new network for a small paper company. He wants to connect all devices to a central switch. Which topology should he use? Is it a a star topology?
06:02
Be a bust. Apology.
06:05
See a ring, topology
06:09
or D A mesh topology
06:14
give you just a second to think about that.
06:17
Go back to the beginning of the module.
06:20
And that's right. A star topology. This will connect everything to that central switch.
06:27
Next question Glasses is updating firewall rules on the Stanford branch firewall. He wants to block all SS H traffic.
06:35
What port should he block to stop the SS H traffic? Is it a port 53
06:43
Be port 80
06:46
Sea port 22.
06:49
Or is it deport 443
06:55
And he should all be familiar ports.
07:00
And it is C 22. Um, Well, so we'll go back to that question. I'm so poor a 53. That's D n s
07:09
port be Port 80. Is http. Traffic, see, as we mentioned, 22 is sshh
07:17
and D for for three is H T T. P s
07:23
and last question. Ryan can't get to his favorite site, wolf dot com, and would like to check basic and activity between his computer and the website. What tool should he use first?
07:34
And this one, remember, is to check basic connectivity between his computer and the website.
07:42
So our options are a trace route.
07:45
Be hammer.
07:46
See map.
07:48
Where is it? D ping?
07:54
And that's right. This one is Ah Dee Ping. I want to use Ping to check for that basic connectivity.

Networking Fundamentals for Security Practitioners

In this course, you will learn the fundamentals of networking through the lens of a security practitioner. More specifically, we will cover topics like network protocols, architecture, devices, and topology, which are vital for any entry level IT/Security professional.

Instructed By

Instructor Profile Image
Dustin Parry
Network Security Engineer
Instructor