Did you know Cybrary has FREE video training? Join more than 2,500,000 IT and cyber security professionals, students, career changers, and more, growing their careers on Cybrary.
In continuing the discussion of the OSI model layer 1, we look at the types of threats that occur and protection concerns that should not be overlooked. You'll learn about layer 2, the Data Link layer and what occurs there. You'll learn why there are two sublayers, what happens at each and what type of access control and error protections live at these layers.