Network Structures and Web Technologies in Cybersecurity
Fundamental Networking Concepts
Fundamental Networking Components
Fundamental Networking Protocols
DNS (Domain Name System)
Network and Web Security Technologies
Intrusion Detection Systems (IDSs)
Demilitarized Zones (DMZs)
By placing these services in the DMZ,
Virtual Private Networks (VPNs)
Protecting your Devices on a Public Wi-Fi Network
Network Monitoring and Packet Sniffing
Monitoring a Network with Wireshark
Figure 2.8: Monitoring a network with Wireshark
Analyzing the Wireshark Output
The Packet List Pane
The Packet Details Pane
The Packet Byte Pane
Wireshark shows the packet byte pane in hexadecimal
Analyzing a Wireshark scan
Taking a closer look at the Packet List Pane that displays
In another example, in packet #10214,
Detecting Suspicious Activity on a Network
Figure 2.15: Detect ARP requests
Analyzing Data Flow with Expert Information
Connecting to a VPN Service on your Windows Machine
Figure 2.19: Connecting to a VPN Service
Activating the VPN service
Read the sentences and tick True or False.
List the difference between the HTTP and HTTPS protocols in terms of security.
Explain how Demilitarized Zones (DMZs) are used to protect internal networks from external threats.
Evaluate the effectiveness of Virtual Private Networks (VPNs) in maintaining user privacy.
Evaluate how firewalls and Intrusion Detection Systems (IDSs) can be used to protect networks from attacks.
Explain the difference between network-based and host-based Intrusion Detection Systems (IDSs).
Capture and analyze network traffic:
ARP request analysis:
Detecting unusual network activity in Wireshark