Course 10 - Network Security Fundamentals | Episode 1: Models, Security, Protocols, and IP Addressing
Update: 2025-11-22
Description
In this lesson, you’ll learn about:
Layers: Application, Transport, Internet, Link. II. Security and Access Management (IAM & AAA) Identity and Access Management defines how users authenticate, what they can access, and how their actions are tracked. AAA Model
IV. IP Addressing: IPv4 and IPv6 IPv4
You can listen and download our episodes for free on more than 10 different platforms:
https://linktr.ee/cybercode_academy
- Networking communication frameworks, including the OSI and TCP/IP models
- Identity and Access Management (IAM) and the AAA security model
- Secure and insecure network protocols
- IPv4 and IPv6 addressing fundamentals
- Layer 1 — Physical:
Handles the transmission of bits over physical media (cables, radio waves).
Devices: NICs, hubs, repeaters. - Layer 2 — Data Link:
Responsible for LAN communication using MAC addresses (48-bit hex).
Devices: Switches, bridges.
Protocols: Ethernet, ARP (maps IP → MAC). - Layer 3 — Network:
Handles routing and logical addressing.
Protocols: IP, IPsec, ICMP.
Devices: Routers. - Layer 4 — Transport:
Handles data delivery using:- TCP: Reliable, connection-oriented
- UDP: Fast, connectionless (e.g., VoIP)
TLS/SSL also function here for secure data transfer.
- Layers 5–7 — Session, Presentation, Application:
- Session: Controls communication sessions (simplex, half-duplex, full-duplex).
- Presentation: Formats data (JPEG, MP4, ASCII).
- Application: Interfaces with the user (HTTP, FTP, email protocols).
Layers: Application, Transport, Internet, Link. II. Security and Access Management (IAM & AAA) Identity and Access Management defines how users authenticate, what they can access, and how their actions are tracked. AAA Model
- Authentication (A1):
Proving identity, typically via passwords hashed with SHA or MD5 and compared to stored hashes. - Authorization (A2):
Defines what actions or resources a user is allowed to access. - Accounting (A3):
Logging and auditing user activity for accountability.
Example: Windows event logs for login attempts.
- Discretionary Access Control (DAC):
Users can manage permissions for their own resources (less strict). - Mandatory Access Control (MAC):
Centralized, classification-based access rules (e.g., “Top Secret”).
IV. IP Addressing: IPv4 and IPv6 IPv4
- Introduced in 1983
- Uses 32-bit dotted decimal notation (e.g., 192.168.1.1)
- Address space nearly exhausted
- 10.x.x.x
- 172.16–31.x.x
- 192.168.x.x
- Introduced in 1996
- Uses 128-bit hexadecimal notation
- Virtually unlimited address space → no need for NAT
- Unicast: One-to-one
- Multicast: One-to-many
- Anycast: One-to-nearest node among many
You can listen and download our episodes for free on more than 10 different platforms:
https://linktr.ee/cybercode_academy
Comments
In Channel























