0% found this document useful (0 votes)
12 views14 pages

Network & Network Security

The document discusses networking and network security. It defines networking as enabling devices to connect and communicate. It outlines key network components like hardware (computers, routers, etc.) and software (network OS, protocols, applications). It then details several network career paths like network architect, engineer, administrator, analyst and security specialist. It explains common network attacks and security controls used to protect networks, like firewalls, IDS, load balancers and VPNs. Finally, it lists important things to check during network packet analysis, such as source/destination, protocols, payload content and behavior.

Uploaded by

DAVID MGAYA
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
12 views14 pages

Network & Network Security

The document discusses networking and network security. It defines networking as enabling devices to connect and communicate. It outlines key network components like hardware (computers, routers, etc.) and software (network OS, protocols, applications). It then details several network career paths like network architect, engineer, administrator, analyst and security specialist. It explains common network attacks and security controls used to protect networks, like firewalls, IDS, load balancers and VPNs. Finally, it lists important things to check during network packet analysis, such as source/destination, protocols, payload content and behavior.

Uploaded by

DAVID MGAYA
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 14

URCHINSEC

Networking &
Network Security
INTRODUCTION

Network
Networking is the foundation of modern
communication systems, enabling devices to
connect, share resources or information's
and communicate seamlessly.

Ex; LAN, WAN, Cloud Computing, Social


Media Networks, Smart Home Devices
COMPONENTS

Key Network Components


1 2

Hardware: Components Software: Components Includes

Includes Hardware devices such Network OS such as WS, Protocols,

as Computers, servers, routers, Network services, Network Monitoring

switches, NIC, cables, wireless Applications, Network Security

transceivers, firewalls, IDPS,DLP software's. Network Configuration and


Management.

LEARN MORE
Network CAREER PATH

Network Architect
Focuses on designing and planning entire networks and

creating blueprints for an organization communication

infrastructure

Possible Tools:
❖ Cisco Packet Tracer
❖ GNS3
❖ Visio
Network CAREER PATH

Network Engineer
Responsible for Planning, implementing, and overseeing

the efficient installation, configuration and support

networks system for an organization.

Possible Tools:

❖ Putty

❖ Nslookup and Dig

❖ Ping, Traceroute, Netstat


Network CAREER PATH

Network Administrator
Responsible for day-to-day operations of computer
networks within organization including managing,
troubleshooting and maintaining network hardware,
software and security.

Possible Tools:

❖ Solarwind NPM

❖ Ansible

❖ Nmap and IPAM


Network CAREER PATH

Network Analyst
Responsible for real time monitoring, maintaining,
investigating and analyzing network infrastructure to
ensure a reliable, scalable and available network
instances.

Possible Tools:

❖ Darktrace

❖ Security Onion
Network CAREER PATH

Network Security
Responsible for effectively safeguarding, implementing,
responding to incidents and managing security measures
to protect network infrastructure and sensitive data
against cyber threats, unauthorized access and security
breaches.

Possible Tools:

❖ Wireshark and Encase

❖ Firewalls and IDPS

❖ Nessus and OpenVAS

❖ SIEMs (ELK, logstash and Kibana)


Network Security Focus

Common Network Attacks


❖ Denial-of-Service (DoS) Attack

❖ Man-in-the-Middle (MitM) Attack

❖ DNS Spoofing and Cache Poisoning

About Company
❖ Eavesdropping (Packet Sniffing)

❖ Botnet Attack
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut
❖ Ransomware labore et dolore magna aliqua. Ut enim ad minim veniam, quis nostrud exercitation ullamco
laboris nisi ut aliquip ex ea commodo consequat.
Network security Controls
Administrative Controls
Physical Controls
01 02 are management limitations,
provide physical protection of the
information, buildings, and all other operational and accountability

physical network assets of an procedures, and other controls that

organization such as CCTV , security ensure the security of an organization

guards, Biometric AC. eg Policies

Technical Controls
03
This is a set of security techniques and
measures taken to protect network,
data and systems from unauthorized
access and cyber threats eg Firewalls
Technical Controls or Countermeasures

Firewalls ACLs IDPS

Vision Mission

Network SIEM NOC

Segmentation
STUDIO SHODWE

Countermeasures

Load Balancer VPNs IAM

Vision Mission

DLP Solutions Proxy Servers User Behaviour


Analysis (UBA)
STUDIO SHODWE

Network Forensic
Important Things to check on while analyzing a network packet

❖ Try to understand the packet patterns.


❖ Source and destinations Information.
❖ Protocols and Ports.
❖ Packet length and windows size.
❖ Events Correlations and Timing.
❖ Payload and Content.
❖ Behavior Analysis.
❖ Session Establishment and Termination.
❖ Packets with unusual flags or characteristics
❖ Encrypted Traffic Analysis.
Thank You

You might also like