Fundamentals of Network Security
3.9 (10 ratings)
Instead of using a simple lifetime average, Udemy calculates a course's star rating by considering a number of different factors such as the number of ratings, the age of ratings, and the likelihood of fraudulent ratings.
70 students enrolled
Wishlisted Wishlist

Please confirm that you want to add Fundamentals of Network Security to your Wishlist.

Add to Wishlist

Fundamentals of Network Security

Securing the Network Infrastructure
New
3.9 (10 ratings)
Instead of using a simple lifetime average, Udemy calculates a course's star rating by considering a number of different factors such as the number of ratings, the age of ratings, and the likelihood of fraudulent ratings.
70 students enrolled
Created by Corey Charles
Last updated 9/2017
English
Current price: $10 Original price: $195 Discount: 95% off
5 hours left at this price!
30-Day Money-Back Guarantee
Includes:
  • 2 hours on-demand video
  • 1 Supplemental Resource
  • Full lifetime access
  • Access on mobile and TV
  • Certificate of Completion
What Will I Learn?
  • Students will be able to Describe, compare and identify various network concepts Fundamentals of TCP/IP Describe and compare fundamental security concepts Describe network applications and the security challenges Understand basic cryptography principles
View Curriculum
Requirements
  • Students should have basic networking knowledge
  • Students should have basic cyber security knowledge
Description

By the end of this course you will be fully aware of the wired and wireless computer networks basics, devices, network based vulnerabilities and protocols in a step-by-step pace. You will also reach the professional level in networks security in terms of concepts, technologies, and tools. The course requires no background or pre-requisite, yet you will be able to understand all the up-to-date terminologies in the networks security during the lectures.

This course is organized as follows:

    • Section 1: Introduction Lecture 
    •  1: Introduction


        • Section 2: Understanding the OSI Model The functionality of the OSI Model
        • Lecture2: OSI Model 
        • Lecture3: Data Encapsulation and De-Encapsulation
        • Lecture4: TCP/IP Model
        • Quiz 1: Section 2 Review Quiz

    • Section 3: Internet Protocol The functionality of the Internet Protocol
    • Lecture5: Introduction to the Internet Protocol
    • Lecture6: IP Addressing
    • Lecture7: IP Address Classes
    • Lecture 8: Reserved IP Addresses
    • Lecture 9: Public and Private IP Addresses
    • Lecture 10: IPv6 Addresses
    • Quiz 2: Section 3 Review Quiz

    • Section 4: Transmission Control Protocol The functionality of Transmission Control Protocol
    • Lecture 11: Introduction to Transmission Control Protocol
    • Lecture 12: TCP Three-Way Handshake
    • Quiz 3: Section 4 Review Quiz

    • Section 5: User Datagram Protocol The functionality of the User Datagram Protocol
    • Lecture 13: Introduction to the User Datagram Protocol
    • Lecture 14: TCP and UDP Ports
    • Lecture 15: Address Resolution Protocol
    • Lecture 16: Host-to-Host Packet Delivery Using TCP
    • Lecture 17: Wireshark
    • Quiz 4: Section 5 Review Quiz

    • Section 6: Vulnerabilities Network Vulnerabilities
    • Lecture 18: TCP/IP Vulnerabilities (Preview enabled)
    • Lecture 19: IP Vulnerabilities
    • Lecture 20: ICMP Vulnerabilities
    • Lecture 21: TCP Vulnerabilities
    • Lecture 22: TCP Session Hijacking
    • Lecture 23: UDP Vulnerabilities


Who is the target audience?
  • Network Analyst, Network Engineers, Network Architects
  • Security Analyst, Security Engineers, Security Architects
Compare to Other Network Security Courses
Curriculum For This Course
27 Lectures
01:45:41
+
Introduction
1 Lecture 00:24
+
Understanding the OSI Model
4 Lectures 16:17

In the early 1980s, companies added networks and expanded existing networks as rapidly as new network technologies and products were introduced. By the mid-1980s, companies began to experience difficulties from all the expansions they had made. It became more difficult for networks using different specifications and implementations to communicate with one another. To address this problem, the ISO created the OSI reference model. The intention of the model was to provide vendors with a set of standards that ensure greater compatibility and interoperability between the various types of network technologies that are produced by companies around the world. The model was never actually implemented; but it is still used today as a conceptual model to provide a means of describing how data is transmitted over a network.

The OSI reference model separates network functions into seven categories, or layers, and defines the network functions that occur at each layer. Each layer provides services to the layer above it, uses services from the layer below it, and has an abstract connection to the same layer on the peer system. This modularization of function simplifies the implementation of complex network functions. And by defining these functions, the OSI model helps users understand how data from an application program travels through a network medium to an application program that is located in another computer.

Although other models exist, most network vendors today relate their products to the OSI reference model, especially when they want to educate customers on the use of their products. The OSI model, which addresses hardware, software, and data transmission, is considered the best tool available for teaching people about sending and receiving data on a network.

In the IT industry, when a layer is referred to by number, it is normally the OSI layer, not the TCP/IP layer.

The layers of the OSI model are as follows:


  • Layer 1, Physical: The physical layer defines the electrical, mechanical, procedural, and functional specifications for activating, maintaining, and deactivating the physical link between end systems. Characteristics such as voltage levels, timing of voltage changes, physical data rates, maximum transmission distances, physical connectors, and other similar attributes are defined by physical layer specifications. Examples of Layer 1 devices are transceivers, modems, CSU/DSU, and hubs.

  • Layer 2, Data Link: The data link layer defines how data is formatted for transmission and how data accesses the physical layer. This layer also typically includes error checking. Examples of Layer 2 devices are bridges and switches, which forward and flood traffic based on MAC addresses. Although MAC  addresses are typically physical addresses, they operate at the data link layer of the OSI model.

  • Layer 3, Network: The network layer provides connectivity between two host systems that can be located on geographically separated networks. It provides logical addressing, selects the best path for data delivery, and routes data packets. An example of a Layer 3 device is a router.

  • Layer 4, Transport: The transport layer segments data from the system of the sending host and reassembles the data into a data stream on the system of the receiving host. For example, business users in large corporations often transfer large files from field locations to a corporate site. Reliable delivery of the files is important, so the transport layer breaks down large files into smaller pieces, which are known as segments, that are less likely to incur transmission problems.

    The boundary between the transport layer and the session layer can be thought of as the boundary between application protocols and data-flow protocols. Whereas the application, presentation, and session layers are concerned with application issues, the lower four layers are concerned with data  transport issues.

    The transport layer shields the upper layers from transport implementation details. Specifically, issues such as reliability of transport between two hosts are assigned to the transport layer. In providing a communication service, the transport layer establishes, maintains, and properly terminates virtual circuits. Transport error detection, error recovery, and information flow control ensure reliable service.

  • Layer 5, Session: The session layer establishes, manages, and terminates sessions between two communicating hosts. The session layer also synchronizes dialog between the presentation layers of the two hosts and manages their data exchange. For example, web servers have many users, so there are many communication processes open at a given time. Therefore, it is important to keep track of which user communicates on which path.

  • Layer 6, Presentation: The presentation layer ensures that the information that is sent at the application layer of one system is readable by the application layer of another system. For example, a PC program communicates with another computer, with one computer using EBCDIC and the other using ASCII to represent the same characters. If necessary, the presentation layer translates between multiple data formats by using a common format.

  • Layer 7, #The application layer is the OSI layer that is closest to the user. This layer provides network services to the applications of the user, such as email, file transfer, and terminal emulation. The application layer differs from the other layers in that it does not provide services to any other OSI layer, but only to applications outside the OSI model. The application layer establishes the availability of intended communication partners and synchronizes and establishes agreement on procedures for error recovery and control of data integrity.

Preview 06:11

Information that is to be transmitted over a network must undergo a process of conversion at both the sending end and the receiving end of the communication. That conversion process is known as encapsulation and de-encapsulation.

The information that is sent on a network is referred to as data or data packets. If one computer wants to send data to another computer, the data must first be packaged by a process called encapsulation. Encapsulation works very similarly to sending a package through a postal service. The first step is to put the contents of the package into a container. Next, you write the address of the location to which you want to send the package on the outside of the container. Then you put the addressed package into the postal service collection bin, and the package begins its route toward its destination.

Encapsulation wraps data with each network layer's necessary protocol information before network transit. As the data moves down through the layers of the OSI reference model, each OSI layer adds a header (and a trailer, if applicable) to the data before passing it down to a lower layer. The process is illustrated in the figure below. The headers and trailers of an upper layer are not for use by the lower layers, instead they contain control information for the network devices along the way, and ultimately, the receiver. The control information ensures proper delivery of the data and to ensure that the receiver can correctly interpret the data.

The following steps occur to encapsulate data:


  1. The user data is presented to the application layer.

  2. The application layer adds the application layer header (Layer 7 header) to the user data. The Layer 7 header and the original user data become the data that is passed down to the presentation layer.

  3. The presentation layer adds the presentation layer header (Layer 6 header) to the data. The combined data and header then become the data that is passed down to the session layer.

  4. The session layer adds the session layer header (Layer 5 header) to the data. This combination then becomes the data that is passed down to the transport layer.

  5. The transport layer adds the transport layer header (Layer 4 header) to the data. This combination, which is known as a segment, becomes the data that is passed down to the network layer.

  6. The network layer adds the network layer header (Layer 3 header) to the data. This combination, which is known as a packet, becomes the data that is passed down to the data link layer.

  7. The data link layer adds the data link layer header and trailer (Layer 2 header and trailer) to the data. A Layer 2 trailer is usually the FCS, which is used by the receiver to detect whether the data is in error. This combination, which is known as a frame, then becomes the data that is passed down to the physical layer.

  8. The physical layer then transmits the bits onto the network media.

Note

The format of the data at each layer is generically known as the PDU. There is also terminology that is used for the PDU at certain layers. For example, the Layer 2 (data link layer) PDU is called a "frame." The Layer 3 (network layer) PDU is called a "packet." The Layer 4 (transport layer) PDU is called a "segment" for TCP or a "datagram" for UDP.

When the remote device receives a sequence of bits, the physical layer at the remote device passes the bits to the data link layer for manipulation, beginning the de-encapsulation process. The de-encapsulation process is similar to that of reading the address on a package to see if it is for you, and then removing the contents of the package if it is addressed to you.

Note

The term "decapsulation" is sometimes used in place of the term "de-encapsulation." Both terms are acceptable.

When the data link layer receives the data, it checks the data-link trailer (the FCS) to see if the binary data has been corrupted in transit. While some data-link technologies can request retransmission for corrupt data, most modern data-links, including Ethernet, will simply discard the corrupted frame. In such environments, if reliability is required, it must be provided by upper layers in the stack. If the data is not in error, the data link layer reads and interprets the control information in the data-link header. The data link layer strips the data-link header and trailer, and then passes the remaining data up to the network layer based on the control information in the data-link header. Each subsequent layer performs a similar de-encapsulation process eventually presenting the original user data from the source to the program running on the peer system.

Data Encapsulation and De-Encapsulation
04:29

TCP/IP Model
04:39

An Important Message From Corey
00:58
+
Internet Protocol
6 Lectures 24:41
Introduction to the Internet Protocol
02:17

IP Addressing
05:12

IP Address Classes
03:32

Reserved IP Addresses
04:48

Public and Private IP Addresses
02:45

IPv6 Addresses
06:07
+
Transmission Control Protocol
2 Lectures 05:34
Introduction to Transmission Control Protocol
03:58

TCP Three-Way Handshake
01:36
+
User Datagram Protocol
5 Lectures 16:52
Introduction to the User Datagram Protocol
04:45

TCP and UDP Ports
03:20

Address Resolution Protocol
01:43

Host-to-Host Packet Delivery Using TCP
02:37

Wireshark
04:27
+
Vulnerabilities
6 Lectures 34:26

IP Vulnerabilities
06:34

ICMP Vulnerabilities
04:57

TCP Vulnerabilities
06:01

TCP Session Hijacking
04:11

UDP Vulnerabilities
06:54
+
Nessus Vulnerability Scanner
1 Lecture 05:50
Nessus Practical Lab
05:50
+
Conclusion
2 Lectures 01:37
Conclusion
00:42

BONUS: A Special Offer to My Students
00:55
About the Instructor
Corey Charles
3.9 Average rating
10 Reviews
70 Students
1 Course
Security+, Qualys Vulnerability Management Specialist, MSIS

Corey Charles is Security+, Qualys Vulnerability Management Specialist Certified. Mr. Charles has 11 years experience in IT Security with a direct focus in Vulnerability Management. Mr. Charles also taught  on the collegiate level, teaching IT Security at Herzing University.

Mr. Charles also holds two Bachelors of Arts Degrees, Digital Design and Media Arts, one Associates, Digital Design from Tulane University. Two Master Degrees from Strayer University, Master of Science in Computer
Security Management and Master of Science in Computer Forensics Management. He holds an Executive Graduate Certification in Computer Networking.