Lesson 2 Network and Web Security

Network Structures and Web Technologies in Cybersecurity

Fundamental Networking Concepts

Lesson 2 Network and Web Security

Fundamental Networking Components

Fundamental Networking Protocols

Lesson 2 Network and Web Security

DNS (Domain Name System)

Network and Web Security Technologies

Intrusion Detection Systems (IDSs)

Demilitarized Zones (DMZs)

Lesson 2 Network and Web Security

By placing these services in the DMZ,

Virtual Private Networks (VPNs)

Protecting your Devices on a Public Wi-Fi Network

Lesson 2 Network and Web Security

Network Monitoring and Packet Sniffing

Monitoring a Network with Wireshark

Lesson 2 Network and Web Security

Figure 2.8: Monitoring a network with Wireshark

Lesson 2 Network and Web Security

Analyzing the Wireshark Output

The Packet List Pane

Lesson 2 Network and Web Security

The Packet Details Pane

The Packet Byte Pane

Wireshark shows the packet byte pane in hexadecimal

Lesson 2 Network and Web Security

Analyzing a Wireshark scan

Lesson 2 Network and Web Security

Taking a closer look at the Packet List Pane that displays

Lesson 2 Network and Web Security

In another example, in packet #10214,

Lesson 2 Network and Web Security

Detecting Suspicious Activity on a Network

Lesson 2 Network and Web Security

Figure 2.15: Detect ARP requests

Lesson 2 Network and Web Security

Analyzing Data Flow with Expert Information

Lesson 2 Network and Web Security

Connecting to a VPN Service on your Windows Machine

Lesson 2 Network and Web Security

Figure 2.19: Connecting to a VPN Service

Activating the VPN service

Lesson 2 Network and Web Security

Read the sentences and tick True or False.

List the difference between the HTTP and HTTPS protocols in terms of security.

Lesson 2 Network and Web Security

Explain how Demilitarized Zones (DMZs) are used to protect internal networks from external threats.

Evaluate the effectiveness of Virtual Private Networks (VPNs) in maintaining user privacy.

Lesson 2 Network and Web Security

Evaluate how firewalls and Intrusion Detection Systems (IDSs) can be used to protect networks from attacks.

Explain the difference between network-based and host-based Intrusion Detection Systems (IDSs).

Lesson 2 Network and Web Security

Capture and analyze network traffic:

ARP request analysis:

Detecting unusual network activity in Wireshark