WEBVTT

00:00:00.880 --> 00:00:03.210
Network security is an important part of the

00:00:03.210 --> 00:00:06.120
Certified in Cybersecurity examination.

00:00:06.640 --> 00:00:09.940
Let's take a look at the key areas we looked at in this domain.

00:00:10.920 --> 00:00:15.600
We divided this domain into three parts, computer networking, network

00:00:15.600 --> 00:00:18.520
threats and attacks, and network infrastructure.

00:00:19.040 --> 00:00:21.090
When we look at computer networking,

00:00:21.090 --> 00:00:23.980
we can understand the importance of networks today.

00:00:24.560 --> 00:00:30.080
Networks in many ways are the conduit that allows traffic to flow

00:00:30.090 --> 00:00:32.960
between different systems and different devices.

00:00:33.410 --> 00:00:37.620
We could easily say that networks, therefore, are the pipeline that

00:00:37.630 --> 00:00:41.140
almost all business operations actually run on.

00:00:41.970 --> 00:00:47.290
We see that network security needs to address all three parts of the CIA

00:00:47.290 --> 00:00:51.480
triad: preserving the confidentiality of our communications,

00:00:51.920 --> 00:00:55.780
preserving the integrity and accuracy of our communications,

00:00:55.840 --> 00:00:59.560
and ensuring availability that the systems and networks are

00:00:59.560 --> 00:01:01.110
there when they're required.

00:01:01.860 --> 00:01:06.080
When we talk over a network, we use protocols. Protocols are the

00:01:06.080 --> 00:01:11.250
languages used to enable communications, and protocols define the

00:01:11.250 --> 00:01:13.820
structure of those communications.

00:01:14.050 --> 00:01:19.090
They ensure that a message is understood at the far end and can also help

00:01:19.090 --> 00:01:21.810
with things like clarity and error correcting as well.

00:01:22.490 --> 00:01:28.730
Some of the main protocols or languages we use include TCP/IP, which included

00:01:28.740 --> 00:01:32.280
Internet Protocol version 4 and Internet Protocol version 6.

00:01:33.290 --> 00:01:38.160
We took a look at the Open Systems Interconnection model and ISO standard

00:01:38.160 --> 00:01:43.140
7498, and how it defined the structure of communications.

00:01:43.550 --> 00:01:47.660
And we know that many of our communications today are wireless, using

00:01:47.660 --> 00:01:52.890
protocols on structured communications such as wireless fidelity.

00:01:52.890 --> 00:01:56.980
Firewalls are an important part of network security.

00:01:57.270 --> 00:02:01.850
They control traffic between different networks and different network segments.

00:02:02.640 --> 00:02:06.430
They do this by having doors or ports that allow certain

00:02:06.430 --> 00:02:09.919
types of traffic to come through and certain types of

00:02:09.919 --> 00:02:12.190
languages or protocols as well.

00:02:12.780 --> 00:02:17.510
Networks are also protected through things like stateful inspection

00:02:17.510 --> 00:02:24.040
firewalls that are important to try to make sure that only wanted

00:02:24.040 --> 00:02:26.950
communications are allowed through the firewall.

00:02:28.010 --> 00:02:32.450
Unfortunately, networks are very much a common place of attack,

00:02:32.590 --> 00:02:36.240
but network security has to look at two different types of

00:02:36.240 --> 00:02:40.610
attack vectors, attacks against the networks themselves such as

00:02:40.610 --> 00:02:42.950
a distributed denial‑of‑service attack,

00:02:43.270 --> 00:02:47.770
but also using the network as a way to attack devices

00:02:47.770 --> 00:02:49.790
and systems connected to the network.

00:02:50.120 --> 00:02:53.950
So this is where network security must protect the network, but

00:02:53.950 --> 00:02:57.350
also seek to protect the devices that it connects.

00:02:57.410 --> 00:03:02.050
We always have to watch out for unwanted traffic such as spam or

00:03:02.050 --> 00:03:05.980
attacks such as the man‑in‑the‑middle attack where someone is trying

00:03:05.980 --> 00:03:10.220
to intercept, maybe to listen into our communication or even alter

00:03:10.220 --> 00:03:11.960
it or delete communications.

00:03:13.080 --> 00:03:15.070
When we look at network defenses,

00:03:15.070 --> 00:03:19.520
we know that there is a number of different layers and types of defense we use,

00:03:19.770 --> 00:03:24.330
we put in place policies such as what is acceptable use of the internet,

00:03:24.580 --> 00:03:27.800
what can a person download onto their systems.

00:03:28.100 --> 00:03:30.040
We also put in firewalls,

00:03:30.050 --> 00:03:34.580
intrusion detection and intrusion prevention systems, and, of

00:03:34.580 --> 00:03:39.060
course, we run scans on our systems to try to pick up unwanted

00:03:39.060 --> 00:03:44.370
traffic such as malware or even spam. Networks rely on an

00:03:44.380 --> 00:03:46.920
infrastructure in order for them to operate.

00:03:47.350 --> 00:03:51.760
This includes power, heating, ventilation, and air conditioning, and

00:03:51.760 --> 00:03:54.470
protection of cables through things like conduits.

00:03:55.900 --> 00:03:57.890
When we look at network design,

00:03:58.080 --> 00:04:01.810
it's an important part of how we build a robust network.

00:04:02.030 --> 00:04:06.490
We do things like network segmentation, demilitarized zones,

00:04:06.500 --> 00:04:09.920
virtual LANs, and cloud‑based services.

00:04:10.060 --> 00:04:14.830
All of these make up the robust resilient networks we rely

00:04:14.830 --> 00:04:18.010
on today for different types of traffic and different

00:04:18.010 --> 00:04:21.250
types of use. The Next Steps.

00:04:21.850 --> 00:04:23.530
Network security is important.

00:04:23.810 --> 00:04:28.230
It's really good to review and ensure that we understand each of the

00:04:28.230 --> 00:04:32.430
topic areas we've covered; not just memorization, but understanding

00:04:32.430 --> 00:04:35.300
how we use and protect our systems.

00:04:35.940 --> 00:04:41.750
We want to do the sample questions in the study guide to validate and verify the

00:04:41.750 --> 00:04:47.400
understanding we have and then proceed to the next domain, Security Operations

00:04:47.570 --> 00:04:50.660
for the Certified in Cybersecurity certification.
