Networking Fundamentals


Physical devices facilitating network connectivity and communication.


Connects devices within a single network, enabling communication.

Networking for Cyber Security

Networking is critical in the cybersecurity domain, providing the infrastructure for data exchange while requiring defense against threats and attacks.

Fundamental Concepts

Networking principles are foundational to understanding cyber security.

TCP/IP Stack

The core communication protocols for the internet, involving layers like Link, Internet, Transport, and Application.

OSI Model

A conceptual framework with 7 layers to standardize communications functions.

### Network Topologies Arrangement of various


Enables reliable, ordered, and error-checked delivery of a stream of bytes between applications.


Responsible for delivering packets from the source host to the destination host based on the IP addresses in packet headers.

Networking for Cyber Security

The study of networking fundamentals to secure information systems against cyber threats.

Networking Basics

Understanding the foundational elements of networking is crucial for cyber security.

OSI Model

Explains the different layers that constitute a complete networking framework.

Network Topologies

Defines the layout patterns of network connections, like star, mesh, and ring.


Rules that dictate the communication over networks, such as TCP/IP, UDP, HTTP, etc.

Hardware Components

Devices that facilitate networking like routers, switches, and firewalls.

Cyber Security Principles

Foundational principles ensure integrity, confidentiality, and availability of information.

CIA Triad

Key security model: Confidentiality, Integrity, and Availability.

Risk Management

Identifying and mitigating risks in the network infrastructure.

Access Control

Restricting access to network resources to safeguard information.


Scrambling data to prevent unauthorized access.

Network Vulnerabilities

Recognizing and understanding weaknesses in the network to protect against attacks.

Common Attack Types

Methods used by attackers, including DDoS, phishing, and MITM attacks.

Vulnerability Assessment

The process of identifying and quantifying vulnerabilities in a network.

Penetration Testing

Simulating cyber-attacks to test the resiliency of the network security.

Security Patches

Updating systems to correct security vulnerabilities.

Defense Strategies

Proactive measures to protect networks from cyber threats.


Hardware or software that blocks unauthorized access while allowing authorized communications.

Intrusion Detection & Prevention

Systems that monitor network traffic for malicious activities or policy violations.

Antivirus & Anti-malware

Software designed to detect, prevent, and remove malware.

Security Information and Event Management (SIEM)

Tools that provide real-time analysis of security alerts generated by network hardware and applications.

Legal and Ethical Considerations

Understanding the impact of regulations and ethical standards on network security.

Data Protection Laws

Legislation governing the protection of personal data like GDPR and HIPAA.

Ethical Hacking

Authorized testing to improve system security while abiding by legal and moral guidelines.

Incident Response

The organized approach to addressing and managing the aftermath of a security breach.

Privacy Policies

Corporate guidelines that govern data collection, handling, and sharing.