book at the outline. What we're gonna cover is very comparable to what you would expect. We're going to talk about the beloved O S I reference model
in just about any class you cake that's gonna cover networking. Security is gonna talk about that, Wes I model. And I think it's a very important model because it helps us understand. Um,
the various things that happened in networking we'll go into that now. By the time we've covered the Westside reference model,
we will have talked about various network protocols and network protocols really governed the rules of communication and various protocols have varying rules for communication. And the bottom line is we, of course, have to be using the same rules if we're gonna communicate successfully.
Ah, we will also have talked about network communication devices,
huh? Switch router, villain. Layer three switch because again, you know, when you're having this discussion on the S I model, it's really hard for me to tell you a routers, layer three without telling me what a router does. So, honestly, by the time we get through the s I model, we will have covered a lot
of the work That's in this chapter.
Also, firewalls will talk about that in the conclusion of the S on model because I think firewalls are a really good way to see the significance of O s. I. And then the final section that will cover is gonna be on wireless communications. I think you're gonna see a lot of questions there specifically
threats, wireless communications and the difference between the security mechanisms of weap
w p A and W p A to. And yes, they are very much still asking questions on wept. And if you think Weps weapons obsolete, you are wrong. Many companies still use wept. Ah, a lot of Internet service providers.
If you'll take a look at your router, you're gonna find a Web key on them. So wet
Excuse me is not obsolete
should be, but it isn't so. We'll talk about the differences between those three mechanisms. Like I said, that's a very testable chapter. So take some good notes, rely on the experience you have with telecommunications in network security