Site icon TheCyberThrone

Certified in Cybersecurity Domain 4 Network Security Detailed Notes

Advertisements

Objective

This domain introduces the core concepts of networking and how security integrates within that structure. You’ll explore topics from basic network models and devices to secure communication protocols and common threats.

Purpose: To understand how to secure network infrastructures, ensure safe data transmission, and protect against unauthorized access, attacks, and misuse.

Why Network Security Matters

Key Concepts Covered:

  1. Basic Networking Components
    • Routers, switches, firewalls, load balancers, access points
    • OSI & TCP/IP models: what each layer does
    • IP addressing, ports, and protocols (e.g., HTTP, HTTPS, FTP, DNS)
  2. Network Topologies and Zones
    • LAN, WAN, WLAN
    • DMZ (Demilitarized Zone), intranet, extranet
    • Segmentation (e.g., VLANs)
  3. Secure Communication Protocols
    • HTTPS, SSH, SFTP, VPNs
    • TLS/SSL and their role in encryption
  4. Firewalls and Intrusion Detection/Prevention Systems
    • Packet filtering, stateful inspection
    • IDS vs. IPS: detection vs. prevention
  5. Common Threats to Networks
    • Man-in-the-middle (MITM) attacks
    • DDoS (Distributed Denial-of-Service)
    • Spoofing, sniffing, session hijacking
  6. Network Security Best Practices
    • Principle of least privilege (PoLP)
    • Network segmentation and isolation
    • Regular patching and updates
    • Monitoring and logging network traffic
  7. Wireless Network Security
    • WPA3 vs. WPA2, encryption standards
    • MAC filtering, disabling SSID broadcast

4.1 Understand Computer Networking

Network Models

OSI Model – 7 Layers (top-down):

TCP/IP Model – 4 Layers:

IP Addressing

IPv4:

IPv6:

Ports

Purpose: Identify specific applications or services on a host.

Types of Ports:

Common Network Applications/Protocols

Wi-Fi (Wireless Networking)

Security Best Practices

Key Takeaways

4.2  Understand Network Threats and Attacks

1. Types of Threats

Distributed Denial-of-Service (DDoS)

Virus

Worm

Trojan Horse (Trojan)

Man-in-the-Middle (MITM) Attack

Side-Channel Attack

2. Identification of Threats

Intrusion Detection System (IDS)

Types:

3. Prevention of Threats

Antivirus/Antimalware

Scans

Firewalls

Intrusion Prevention System (IPS)

Key Takeaways

4.3 Understand Network Security Infrastructure

This domain focuses on how network infrastructure is secured, covering on-premises, network design, and cloud-based infrastructure. It builds your foundational understanding of architectural components, physical environments, segmentation strategies, and service models in cloud computing.

On-Premises Infrastructure

1. Power

2. Data Centers and Network Closets

3. HVAC (Heating, Ventilation, and Air Conditioning)

4. Environmental Controls

5. Fire Suppression

6. Redundancy

7. MOU and MOA (Memorandum of Understanding / Agreement)

B. Network Design

Design strategies that secure network architecture from internal and external threats.

1. Network Segmentation

Divides a network into zones to restrict access and reduce exposure.

a. DMZ (Demilitarized Zone)
b. VLAN (Virtual LAN)
c. VPN (Virtual Private Network)
d. Micro-Segmentation

2. Defense in Depth

3. Network Access Control (NAC)

C. Cloud Infrastructure

Covers the various models and security considerations for cloud-based environments.

1. SLA (Service-Level Agreement)

2. Managed Service Provider (MSP)

3. Cloud Service Models

Each model determines how security responsibilities are shared between the provider and customer.

a. SaaS (Software as a Service)
b. PaaS (Platform as a Service)
c. IaaS (Infrastructure as a Service)

4. Hybrid Cloud

Key Takeaways

Exit mobile version