Basics of Cyber Security
Part 01
- Network
• LAN, WAN, MAN, PAN
• Client, Server, Node
2. Types of Networks:
• Wired vs Wireless
• Peer-to-Peer vs Client-Server
3. Network Topologies:
• Bus, Star, Ring, Mesh, Hybrid
4. Network Devices:
• Hub, Switch, Router, Bridge, Modem, Access Point
• Firewall
5. IP Addressing:
• IPv4 vs IPv6
• Private vs Public IP
• Static vs Dynamic IP
• Subnetting
6. MAC Address & ARP (Address Resolution Protocol)
7. Ports & Protocols:
• What are ports (0–65535)?
• Common ports (HTTP-80, HTTPS-443, FTP-21, SSH-22, etc.)
8. OSI & TCP/IP Models:
• 7 OSI layers and examples for each
• Difference between OSI & TCP/IP models
9. Data Transmission:
• Packets, Frames, Bits
• Encapsulation and Decapsulation
Part 2
1. Subnetting
• Network ID, Broadcast ID, Subnet Mask, CIDR notation
• Practice manually
2. Switching Concepts:
• MAC table, VLANs, Trunking
• STP (Spanning Tree Protocol)
3. Routing Concepts:
• Static Routing vs Dynamic Routing
• Protocols: RIP, OSPF, EIGRP, BGP
4. DHCP & DNS
5. NAT (Network Address Translation)
6. Wireless Networking:
• SSID, Encryption (WEP, WPA, WPA2, WPA3)
• Channels, frequency bands
7. Network Troubleshooting Tools:
• ping, traceroute, ipconfig/ifconfig, netstat, nslookup, arp, route, dig
Part 3
1. Firewalls:
• Packet filtering, Stateful inspection, Proxy firewalls
2. IDS/IPS Systems:
• Difference and real-world usage
3. VPNs & Tunneling:
• PPTP, L2TP, IPSec, OpenVPN
4. Proxy Servers & NAT Security
5. Packet Analysis (Wireshark):
• Capturing and analyzing traffic
• Filtering suspicious packets
6. Network Scanning Tools:
• Nmap, Angry IP Scanner
• Concepts: Ping sweep, Port scanning, OS detection
7. Network Attacks:
• DoS, DDoS
• MITM (Man-in-the-Middle)
• ARP Spoofing
• DNS Poisoning
• Sniffing & Spoofing
8. Network Hardening:
• Secure router/switch configuration
• Disable unused ports
• MAC filtering
• Using VLANs for segmentation
Part 4
Lab testing
• Cisco Packet Tracer
• GNS3
• TryHackMe