Did you know Cybrary's video training is FREE? Join more than 2,500,000 IT and cyber security professionals, students, career changers, and more, growing their careers on Cybrary.
As we near completion of our Telecommunications Chapter, we examine Firewalls and the concept of trusting and not trusting traffic and how those determinations are made. You'll learn how this correlates to the OSI models, what happens at certain OSI layers that directly ties into how a firewall works. You'll learn the purpose behind a proxy, packet filters, the different types of proxies, how differently they each function and at what OSI level proxies works.