Chapter 2: Exploring Network Components and Security Systems
On all networks, there are many network protocols and services that help to exchange data and access resources. These protocols and services contain vulnerabilities that allow an attacker to leverage the weaknesses found therein. Understanding how these technologies work will provide you with a clear understanding of their operations and how to protect your network from cyber-attacks.
Throughout this chapter, you will learn about various networking technologies, protocols, and services, and how they all work together to forward your messages, such as data between your device and the destination. As a cybersecurity professional, it is essential to fully understand how network devices and protocols function. Upon completing this chapter, you will be able to fully understand the networking aspects of cybersecurity, something that many professionals struggle to grasp.
In this chapter, we will cover the following topics...