Time
33 hours 23 minutes
Difficulty
Beginner
CEU/CPE
33

Video Transcription

00:00
greetings and welcome to the Sai Buri 2019
00:04
Karp Tia Security Plus certification
00:08
preparation course.
00:12
We begin in a brand new module, which is margin number two, and the topic of discussion will be domain to technology and tools.
00:21
Here, again is the objective, which encompasses domain to 2.1 with simply states and stall configuring network components, both hardware software base to support organizational security.
00:34
Before we get going here today, it's perhaps the best place begins by First are engaging in a pre assessment quiz,
00:41
and the quiz reads as follows.
00:44
How many layers of stacks comprised at Westar model? Is it a four
00:50
B seven
00:51
c nine or D?
00:55
In this case, if you select the B, you're absolutely correct is actually Seven Layers, which comprises the ESA model.
01:06
He again would turn on tinted toward the objective, which encompass domain number two, which is stalk and figure network component in both hardware and software base. To support your organization of security, some sub topic which encompassed this objective, we could begin by taking a look at a firewall
01:22
access control lists, application based versus network base state ful versus stateless and, lastly, implicit deny
01:33
So, without further ado, let's take a look at that first agenda item, which is titled The Open System Interconnection Model.
01:40
And so that makes a course in Who made this particular model.
01:42
Basically, the International Standards Organisation was created by a large amount of people.
01:49
The open stand in a connection or side model was created back in 1984 and it comprised a bunch of documents. It's a model of how protocols and networking could be made.
02:01
You can't buy this, and so that makes it also a question while you lies, this particular model. First of all, it's an excellent model for analyzing and also neighbors you as a future security professional to compare as well as troubleshoot various issues within your network.
02:19
It's based upon seven layers or other words. Seven stacks.
02:25
It's a network of modern office, a generic means to separate computer networking functions into multiple layers.
02:32
Each of these layers A relies on layers below it to provide supporting capabilities and perform support to the lives above it.
02:39
Such a model of layer functionality is also called a protocol stack or a protocol suite.
02:49
So let's take a look at the horse armada in terms of what happened at the various layers off the S. Our model.
02:53
What I'm gonna begin by first are taking a look at the physical layer now, within the physical that what happens is it transmits bits
03:01
over a medium to about mechanical and electrical specifications
03:07
and then data Letelier. What happens is it organizes bits into frames to provide hop two hop delivery
03:15
at the network layer. What happened? It moves package from the source to the destination to provide Internet working.
03:23
Then we come to the transport Lear.
03:27
At this particular what happens, it provides with LABA process the process message delivery and error recovery.
03:35
At the session Lee of what happens it established, maintain orders, manage and terminate the sessions.
03:43
Then we have the presentation layer at the presentation that would happen to translate, encrypt and compress your data. And lastly, at the application layer, what happens? It allows access to the network. Resource is
04:00
let's not turn our attention toward a discussion of a firewall.
04:03
Did you know that a firewall remains the foundation of your network security technology? Even today,
04:11
some additional information regarding firewall Ah firewall is a system designed to protect a computer or a computer network from network based attacks.
04:20
A follow does is buy, filter the data packages transfer, sing the network,
04:27
and lastly, a firewall is, ah, Heartwood advice or software solution that inspects and then permits organize network communication
04:35
in terms of some various firewall concepts. We have a term called the Access Control, this
04:42
application based versus Network Base
04:46
State full versus stateless.
04:48
And then we have the unpleasant deny. Now these particular terminology is a concept will be discussed in the upcoming slides here.
04:59
The 1st 1 address is called The Access Control. This
05:02
and Access Control. This is a single injury in a firewall that dictates whether specific communications permitted other words aloud or the night of the words blocked.
05:15
Now, when you look at application based versus network base,
05:19
an application firewall is a formal firewall that controls input,
05:26
output in or access from two or by an application a service.
05:32
On the other hand, a network baseball controls traffic going in and out of a network. It does this by filter in traffic based on the firewall rules and allows only authorized traffic to pass through it.
05:46
When we compare a state full versus Stateless,
05:50
a state full firewall. What it does. It watches your communication and maintains knowledge of the connection.
05:58
A statements firewall permits organized communication based on source destination
06:03
protocol. A port, a stateless firewall excels at hammerin large volumes of traffic.
06:12
The last firewall concept we need to discuss doing this particular video presentation is title in Prison did not.
06:18
It is a security stance that treats everything not given specific and selected permission as suspicious.
06:29
Then we have our post assessment quiz, which in fact is a true or false statement, and it reads as follows.
06:36
The process of creating a packet or encapsulation begins at near seven, which is your application layer rather than level one, which is a physical layer.
06:47
In this case, if you select the true, you're absolutely correct.
06:53
The last item Arjuna is a key take away
06:56
doing this particular video presentation.
06:59
We learned that the open System Interconnection Reference model has been an essential component of computer network design since its inception. Back in 1984
07:10
we learned it. A firewall is, ah, hardware device or suffer solution that inspects and then permits or denies network communication.
07:18
We learned that implicit in that is a statement in a firewall that did takes that all traffic not permitted on the night in existing
07:27
A. C s or access control. This is the night or treated as suspicious.
07:31
We learned in a state for far wall watches, communications and maintain knowledge of the connections.
07:40
We learned that a stateless firewall permits organized communication based on source
07:45
destination
07:46
protocol. A port
07:47
A statements follow excels at handling large volumes of traffic
07:54
and access control. This is a single entry in a firewall that dictates weather. But simply communications permitted other words aloud or the night. In other words, block
08:07
and our upcoming video. We'll continue discussing of 2.1 install configure network components, both hardware and software based to support organizational security. And again, I look forward to seeing, you know, very next video.

Up Next

CompTIA Security+

Interested in the cybersecurity industry? The CompTIA Security+ is the gold standard for those looking to enter the cybersecurity industry. Join thousands of professionals who have gained this certification through this course and launched their careers in information security.

Instructed By

Instructor Profile Image
Jim Hollis
Independent Contractor
Instructor