1 00:00:00,120 --> 00:00:06,150 Welcome to Section two in this section, we're going to go over the basics of networking, we're going 2 00:00:06,150 --> 00:00:12,150 to really get you a foundational understanding of what exactly is a network, how the network works, 3 00:00:12,150 --> 00:00:17,970 as far as how a network communicates, how they communicate with different types of information and 4 00:00:17,970 --> 00:00:21,300 everything that you need to know about how a network works. 5 00:00:21,310 --> 00:00:21,620 Right. 6 00:00:21,630 --> 00:00:26,970 So let's go right ahead and jump into the network basics section two. 7 00:00:27,210 --> 00:00:32,400 So just like I mentioned in this section, we're going to go over some of the networking basics so that 8 00:00:32,610 --> 00:00:34,680 you can get a basic understanding, right. 9 00:00:34,680 --> 00:00:37,710 Foundational understanding of how a network works. 10 00:00:37,730 --> 00:00:43,520 So what we're going to be going over in this section is what exactly networks are, how they function, 11 00:00:43,560 --> 00:00:49,080 what are the different components, the aspects of a network, and then how data travels across the 12 00:00:49,080 --> 00:00:49,510 Internet. 13 00:00:49,680 --> 00:00:56,880 It's important for you to know how data travels and what type of forms, what type of form factors so 14 00:00:56,880 --> 00:01:00,600 that you'll be able to capture that information as a hacker. 15 00:01:00,720 --> 00:01:00,990 Right. 16 00:01:00,990 --> 00:01:08,390 As an ethical hacker and be able to put your mind into the mind of a criminal right into a black hat 17 00:01:08,400 --> 00:01:13,170 mind so that you can be an effective cybersecurity ethical hacker professional. 18 00:01:13,170 --> 00:01:19,170 And then you're also going to learn some important ports and protocols, the differences between a public 19 00:01:19,170 --> 00:01:24,210 and a private IP address and really what an IP address is as well. 20 00:01:24,240 --> 00:01:30,070 And what exactly are subnets and then a practical example of a typical home network. 21 00:01:30,090 --> 00:01:35,240 So let's go right ahead and jump in here into what exactly are networks. 22 00:01:35,640 --> 00:01:41,940 So a network occurs when two or more computers are linked together and can share resources with each 23 00:01:41,940 --> 00:01:42,240 other. 24 00:01:42,540 --> 00:01:48,180 And so on a network, your computer can technically talk to all the other computers on a network. 25 00:01:48,180 --> 00:01:48,480 Right. 26 00:01:48,750 --> 00:01:54,660 And so if they're all connected, then they can communicate back and forth and get access to each other 27 00:01:54,780 --> 00:01:56,890 to different types of information. 28 00:01:56,910 --> 00:02:00,400 And so the good example of a network is the Internet, right? 29 00:02:00,420 --> 00:02:07,440 The Internet is the largest network in the world, and it consists of billions and billions of devices 30 00:02:07,440 --> 00:02:11,670 that communicate with each other due to their connection through the Internet. 31 00:02:11,940 --> 00:02:14,940 So let's go over some of the different types of networks. 32 00:02:14,940 --> 00:02:18,470 So we have a personal area network, a pan. 33 00:02:18,690 --> 00:02:21,820 This is essentially a convenient one person network. 34 00:02:21,870 --> 00:02:28,560 This is typically going to be through some sort of device such as a headset, wireless keyboard, wireless 35 00:02:28,560 --> 00:02:29,580 mice, printers. 36 00:02:29,580 --> 00:02:29,880 Right. 37 00:02:30,180 --> 00:02:32,830 Barcode scanners, gaming consoles. 38 00:02:33,090 --> 00:02:39,460 This is where you're going to have a simple, small, very short personal area network. 39 00:02:39,510 --> 00:02:42,660 Then we have a local area network, a LAN. 40 00:02:42,660 --> 00:02:48,480 If you work in some sort of office setting, then you most likely have been exposed to are aware of 41 00:02:48,480 --> 00:02:50,190 a local area network. 42 00:02:50,340 --> 00:02:52,830 This is the most common for a lot of local businesses. 43 00:02:52,840 --> 00:02:58,080 And with this there's typically a few different computers that are linked to one or two printers. 44 00:02:58,080 --> 00:03:01,500 Also a scanner, maybe a single shared connection to the Internet. 45 00:03:01,710 --> 00:03:08,670 I remember years back when I had my office job, I remember the company had four to five different printers 46 00:03:08,670 --> 00:03:10,080 in the actual office. 47 00:03:10,080 --> 00:03:14,720 And depending where you were working, you had access to a certain printer. 48 00:03:14,730 --> 00:03:19,140 So if you were like, let's say, in the north side of the building or the office, then you would have 49 00:03:19,140 --> 00:03:21,930 access to one type of printer and scanner. 50 00:03:22,140 --> 00:03:27,360 And then if you were like on the west side or on the south side of the office building, then you would 51 00:03:27,360 --> 00:03:28,800 have access to a different printer. 52 00:03:28,810 --> 00:03:31,310 So that's how you can think of a local area network. 53 00:03:31,320 --> 00:03:34,110 And then we have a metropolitan area network. 54 00:03:34,110 --> 00:03:37,950 And this is essentially where it covers an entire town or city. 55 00:03:38,040 --> 00:03:45,000 And then we have a wide area network A when this covers typically a geographical area, you can think 56 00:03:45,000 --> 00:03:48,660 of the Internet as a wind that covers the entire world. 57 00:03:48,660 --> 00:03:54,930 And then the biggest differences between the Internet and many other Panj lands and wins, it is open 58 00:03:54,930 --> 00:03:55,740 to the public. 59 00:03:55,740 --> 00:03:55,940 Right. 60 00:03:55,980 --> 00:04:02,610 Anybody with an Internet connection can actually log on and look at specific websites. 61 00:04:02,610 --> 00:04:03,030 Right. 62 00:04:03,060 --> 00:04:04,590 That are hosted on the Internet. 63 00:04:04,800 --> 00:04:10,680 So one of the things that you need to keep in mind here in differentiating the different networks is 64 00:04:10,680 --> 00:04:12,660 whether or not they're open to the public. 65 00:04:12,660 --> 00:04:12,920 Right. 66 00:04:12,930 --> 00:04:16,370 So you want to think about are they public or are they private? 67 00:04:16,980 --> 00:04:22,490 And one of the other types of networks that you may or may not be familiar with is an Internet. 68 00:04:22,550 --> 00:04:29,340 Now, when I was working in an office setting, we had a online database, which was an Internet for 69 00:04:29,340 --> 00:04:33,870 the company itself, 500 employees in the company when I was working that zones. 70 00:04:33,870 --> 00:04:41,430 And what we had is a database essentially where we only could get access from within the company or 71 00:04:41,550 --> 00:04:43,740 if we had access to the company network. 72 00:04:43,740 --> 00:04:44,090 Right. 73 00:04:44,100 --> 00:04:51,630 And so nobody else outside of the company or anybody else outside of the the actual company had access 74 00:04:51,630 --> 00:04:56,060 to the actual network or the Internet because it was only for employees. 75 00:04:56,070 --> 00:04:59,850 And so that's a private internal Web platform. 76 00:05:00,010 --> 00:05:06,910 That holds information data, right, for the actual company, and that can also be susceptible to attacks 77 00:05:06,910 --> 00:05:12,930 and where, you know, hackers are trying to gather that information because it's private to that company 78 00:05:12,940 --> 00:05:15,350 and then we have a virtual private network. 79 00:05:15,400 --> 00:05:22,240 This essentially allows you to change your, quote unquote, identity online where you can have a different 80 00:05:22,240 --> 00:05:30,520 IP address, different location, so that you can securely look at a get access to a network, a private 81 00:05:30,520 --> 00:05:37,540 one or a public one without leaving any tracks or any traces of who's actually behind the computer. 82 00:05:37,570 --> 00:05:41,300 And so now let's go over the permissions and network security. 83 00:05:41,410 --> 00:05:42,430 So here's the thing. 84 00:05:42,430 --> 00:05:46,600 When it comes to machines being on a network, right, they're all connected. 85 00:05:46,630 --> 00:05:52,030 However, just because they're all connected, it doesn't automatically mean that each machine, each 86 00:05:52,030 --> 00:05:54,940 device is going to have access to the other one. 87 00:05:55,180 --> 00:06:00,610 And so the only way that you're going to be able to get access to the other information on the other 88 00:06:00,610 --> 00:06:04,030 computer or device is if it's given access. 89 00:06:04,030 --> 00:06:04,240 Right. 90 00:06:04,240 --> 00:06:06,260 If you're given access to that information. 91 00:06:06,580 --> 00:06:11,850 Just think about on the Internet, you can gain access to billions and billions of Web pages. 92 00:06:11,860 --> 00:06:15,100 However, you can get access to every single file. 93 00:06:15,100 --> 00:06:20,890 Right, every single page on every single computer that's hooked up to the Internet because some pages 94 00:06:20,890 --> 00:06:25,090 are private, some pages are going to be only for internal use. 95 00:06:25,090 --> 00:06:31,900 And so just because a device is connected to an actual network, yes, they're all essentially connected. 96 00:06:31,900 --> 00:06:36,340 But that doesn't mean they're all going to be able to have access to each other's information. 97 00:06:36,370 --> 00:06:40,950 Permissions and security are central to the idea of networking. 98 00:06:41,260 --> 00:06:48,280 You can only access information, like I mentioned, to information and resources only if that individual 99 00:06:48,610 --> 00:06:50,160 gives you permission to do so. 100 00:06:50,170 --> 00:06:50,490 Right. 101 00:06:50,650 --> 00:06:56,950 And so with hacking, which you're essentially doing, is you're gaining unauthorized access to a computer 102 00:06:56,950 --> 00:07:05,290 network by cracking passwords, defeating any type of security checks, bypassing antivirus, whatever 103 00:07:05,290 --> 00:07:06,700 the attack may be. 104 00:07:07,000 --> 00:07:07,280 Right. 105 00:07:07,300 --> 00:07:11,410 You are hacking because you're getting unauthorized access. 106 00:07:11,410 --> 00:07:11,690 Right. 107 00:07:11,890 --> 00:07:13,820 And to make a network more secure. 108 00:07:14,020 --> 00:07:16,300 Oftentimes, companies, organizations. 109 00:07:16,300 --> 00:07:16,600 Right. 110 00:07:16,780 --> 00:07:18,340 They will install firewalls. 111 00:07:18,490 --> 00:07:23,770 And this can either be like a physical device or a piece of software that's running on your machine, 112 00:07:23,770 --> 00:07:24,880 or it can be both. 113 00:07:25,150 --> 00:07:32,050 I remember when I worked for Zones a while back, we used to sell different type of physical devices 114 00:07:32,050 --> 00:07:35,590 that acted as firewalls that secured networks. 115 00:07:35,590 --> 00:07:41,780 And a lot of times these helped with incoming spam from email incoming attacks. 116 00:07:41,800 --> 00:07:48,040 And so if you look at the image on the right, these are essentially walls that are put up where individual 117 00:07:48,040 --> 00:07:54,730 hackers, let's say, you know, being able to bypass one stage, maybe they get, you know, some sort 118 00:07:54,730 --> 00:07:57,510 of access to information of some sort. 119 00:07:57,790 --> 00:08:02,670 They are essentially reaching the actual end of their destination. 120 00:08:02,680 --> 00:08:10,030 However, they are getting blocked because there's a firewall right before they have the information 121 00:08:10,210 --> 00:08:11,120 that they're looking for. 122 00:08:11,140 --> 00:08:18,400 So firewalls are extremely powerful for being able to block any type of attacks, you know, that are 123 00:08:18,400 --> 00:08:22,020 looking to gather information, steal data, whatever that may be. 124 00:08:22,060 --> 00:08:28,630 As far as having your antivirus there initially or having any other protection, they're having a firewall 125 00:08:28,660 --> 00:08:31,420 adds that extra layer of protection as well. 126 00:08:31,900 --> 00:08:34,840 OK, so we talked about the different types of networks. 127 00:08:35,110 --> 00:08:41,800 We talked about the actual network security, the different things that are involved with the permissions, 128 00:08:41,800 --> 00:08:42,880 you know, firewalls. 129 00:08:43,120 --> 00:08:50,590 And so now we want to go into a little bit more depth as to what exactly is a network consisted of. 130 00:08:50,770 --> 00:08:55,910 And so, as you can see on the right hand side there, that's a visual representation of a network. 131 00:08:55,930 --> 00:09:00,460 So essentially here to make a network, you need nodes and connections. 132 00:09:00,460 --> 00:09:03,250 And these are essentially the links between then and now. 133 00:09:03,250 --> 00:09:07,570 In most office settings, you're going to have wired connections because these are typically going to 134 00:09:07,570 --> 00:09:12,650 be the most strongest as far as connection speed, and they're oftentimes more secure as well. 135 00:09:12,670 --> 00:09:18,400 And so each node on a network needs a special circuit known as a network card. 136 00:09:18,400 --> 00:09:21,380 Now, a node is really just a device, right? 137 00:09:21,490 --> 00:09:28,360 A network card here is a network interface card that is essentially there to get the actual connection 138 00:09:28,360 --> 00:09:29,170 established. 139 00:09:29,470 --> 00:09:34,130 And this is a lot of times through either wireless or wired, it can be both. 140 00:09:34,150 --> 00:09:37,850 And so each network card has its own separate numeric identifier. 141 00:09:38,170 --> 00:09:42,890 And this is known as a media access control or a land Mac address. 142 00:09:42,910 --> 00:09:45,890 And so in that code is a bit like a phone number. 143 00:09:45,940 --> 00:09:51,610 So any machine on the Internet can communicate with another one by sending a message quoting its Mac 144 00:09:51,610 --> 00:09:51,910 code. 145 00:09:51,940 --> 00:09:55,900 So this is how these actual network interface cards look like. 146 00:09:55,900 --> 00:09:59,800 You can see on the left hand side, there's one for a wired connection. 147 00:09:59,870 --> 00:10:05,000 And then on the right hand side, that's for a wireless connection, and especially now there is cards 148 00:10:05,000 --> 00:10:09,590 that have both capabilities for wired and wireless as well. 149 00:10:09,680 --> 00:10:12,890 And so let's look at the Internet as a network. 150 00:10:13,040 --> 00:10:19,790 And so just like highways or railroad lines that connect towns and cities, you know, country, states, 151 00:10:19,790 --> 00:10:20,630 whatever that may be. 152 00:10:20,630 --> 00:10:20,900 Right. 153 00:10:21,230 --> 00:10:27,310 Computer networks are often very much so elaborate and computer networks are very much so the same. 154 00:10:27,470 --> 00:10:29,790 They're all connecting networks all around the world. 155 00:10:29,990 --> 00:10:36,170 And so the Internet, for example, is based on a set of well defined connections called the Internet 156 00:10:36,170 --> 00:10:42,200 backbone, and it includes a vast set of submarine cables under the oceans. 157 00:10:42,230 --> 00:10:47,270 And so if you look at the right hand side, the image there at the top, you'll see all of the connections, 158 00:10:47,270 --> 00:10:51,410 the cables that are connecting the entire world. 159 00:10:51,410 --> 00:10:55,640 Right, so that everybody in the world can gain access to the Internet. 160 00:10:55,670 --> 00:11:01,160 Now, as you can also see, there are some areas that don't have as many cables and connections which, 161 00:11:01,160 --> 00:11:06,070 you know, lack, you know, some Internet or some sort of Internet connection. 162 00:11:06,080 --> 00:11:06,380 Right. 163 00:11:06,410 --> 00:11:12,260 And so when we look at these cables here, it's very interesting to look at that they are just three 164 00:11:12,260 --> 00:11:19,370 inches thick and have a total capacity of between 40 gigabits per second and 10 terabytes per second 165 00:11:19,580 --> 00:11:24,460 and latencies that are close to the speed of light in just a few milliseconds in duration. 166 00:11:24,470 --> 00:11:28,730 So you can see these are very powerful cables here. 167 00:11:28,940 --> 00:11:34,610 If you ever thought about how everybody in the world is connected through the Internet, how can everybody, 168 00:11:34,790 --> 00:11:39,860 you know, just get online and be able to look at some of these Web sites across the world or get on 169 00:11:39,860 --> 00:11:46,910 a Skype call with somebody across the world, is because of these cable connections that are essentially 170 00:11:46,910 --> 00:11:49,710 allowing us to all be connected. 171 00:11:49,730 --> 00:11:55,790 And so that's going to be here for Section two, overview of the Networking Overview Network and BASIX. 172 00:11:56,060 --> 00:11:57,500 And we'll see you on the next one.