Time
10 hours 32 minutes
Difficulty
Beginner
CEU/CPE
11

Video Transcription

00:01
Welcome to Cyber is Video Siris on the Comedy of Security plus 5 +01 Certification and Exam.
00:07
I'm your Instructor, Rahm Warner.
00:10
Please visit cyber harry dot i t. For more information about this certification and many others.
00:17
Before we dive into all the different technologies and tools associated with cyber security, you need to understand the basics of networking.
00:26
For the next few minutes, I'll be going through networking all the different layers associated with it and how it works to communicate across the Internet.
00:36
We need to start by defining what a network is.
00:41
A network is basically a way to get things between two end points.
00:46
Our goal is the basic understanding of common modern networking technology and terminology. So in this quick video, I'll explain the analog digital and applications you'll see with networking
01:00
protocols air used with networking to help move the information from one end point to the other. It's basically just the set of rules, it explains. What do you want to do? So it's an application.
01:11
Where is it going? Add dressings. A. The I P address.
01:15
How are you going to get there? The types of media so like this is an MP four video.
01:22
And did you get there? The acknowledgements An error checking that happens within networking
01:27
throughout domain to We'll talk about the different layers within the OS IE seven layer model. So I am for you to be very familiar with the OS I model. You see it on your screen, also known as protocol stacks. The represented in layers To help understand
01:47
how things traverse a network
01:49
you need to memorize either from the top down or bottom up.
01:53
The bottom is the physical layer than data link, network transport session, presentation and application.
02:01
You see other representations that are based on the OS I model.
02:06
Let me explain each layer
02:07
layer. One is that physical layer could be cat five. CAF, Ivy Cat six, which is twisted pair copper, wire fiber, cable modems or even WiFi
02:20
after the physical layer is the data link layer, also known as layer to.
02:27
This is where you'll find Mac addresses the Media Access Control address for that specific device.
02:35
Each network interface card or nick
02:38
has an associate ID Mac address. You see an example on your screen. This is unique to the device, and the vendor
02:46
Let's practice looking for our Mac address on some common operating systems in the windows. Open a command prompt or terminal within one X or OSX
02:57
and Windows type. If config slash all
03:00
or Lennox, its I P can fake,
03:04
you could also practice on that
03:06
personal computer in your pocket known as a smartphone
03:09
on your screen. You see an example of me doing this on a laptop by one's own.
03:15
Highlighted in yellow is my Mac address.
03:19
You should try this on your own devices. Make sure you fully understand Mac Address ing
03:24
after layer two courses. Layer three network layer. This is where network packets are routed. Uses what's known as encapsulation between each of the layers
03:38
at the network layer. You'll find I P addresses, also known as the Internet Protocol addresses Network Layer also has address resolution protocol Are two types of protocols
03:50
to resolve Mac addresses with I P addresses.
03:54
If you refer back to the if configure example, I showed you can see my local I P address again on any device you have practiced. Looking at both the Mac address and the I P Address
04:09
I p. Address ing for version four has four octet. It's Can you see the example on your screen? Each octet consists of numbers between zero and 2 55
04:20
or 00 and FF and hacks.
04:25
It works sort of like a phone system with area codes to the left and the prefects.
04:30
For example,
04:32
I P Version six uses 128 bit addresses. So theoretically, there's two to the 128th power number of I P addresses for I P v six yen. If you type if config and windows or i p config in Lenox, you'll be able to see whether you're using I p v four
04:53
I p v six
04:55
or both. Also at this layer is I p domain name resolution or D N s. It's like looking up names within the old fashioned phone book equating your girls with the associate ID I p address uses Ah, hierarchical system for resolving names.
05:14
You can use wire shark to see how d and s resolution works. There's also the NS Look up command within windows to be able to look up an I P address
05:25
on your screen. You see the resolution between Google and its I P address
05:30
transport layer is at layer four.
05:33
Protocols of this layer provide host a host communication service is for applications uses incoming and outgoing ports to and from the server.
05:46
Common examples are http over Port 80 and https over Port 443
05:53
There are two major types of transport layer protocols.
05:57
TCP transmission control Protocol is connection oriented and provides error Checking
06:03
UDP user data. Graham Protocol is connection lis and used for streaming like this video.
06:12
So right now I'm talking to you over UDP.
06:15
If I were to confirm all of our communications, then it would be T. C P.
06:20
To make a TCP connection uses what's known as a three way handshake.
06:27
It starts out by saying sin to synchronize
06:30
the client, then response back with a sin AC. Also synchronizing but acknowledging it, the source replies with acknowledgement and conversation begins.
06:43
It ends with a thin packet saying, Feeny, we're done for final
06:50
using wire shark, you can see the TCP three way handshake. An example is on your screen.
07:00
I'm gonna jump up toe application layer layer seven.
07:03
This is where the applications talk to each other.
07:08
For example, email over simple Mel Transport Protocol Web http File Transfers, Transfers FTP and time Network Trot Time protocol NTP
07:23
in review
07:25
you see the different layers of the O s. I model
07:29
Refer to this quick summary as you're reviewing this to make sure you understand all the layers as we work through Domaine two of the security plus exam.

Up Next

CompTIA Security+

CompTIA Security Plus certification is a great place to start learning IT or cybersecurity. Take advantage of Cybrary's free Security+ training.

Instructed By

Instructor Profile Image
Ron Woerner
CEO, President, Chief Consultant at RWX Security Solutions LLC
Instructor