0% found this document useful (0 votes)
3 views

Network Basics

The document provides an overview of computer networks, defining a network as interconnected devices that share resources and data. It covers types of networks (LAN and WAN), key components (switches, routers, firewalls), and networking protocols like TCP/IP and DNS. Additionally, it introduces subnetting, ports, and essential cybersecurity tools, along with installation guidance for tools like Kali Linux and Wireshark.

Uploaded by

omotosodanielle
Copyright
© © All Rights Reserved
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
3 views

Network Basics

The document provides an overview of computer networks, defining a network as interconnected devices that share resources and data. It covers types of networks (LAN and WAN), key components (switches, routers, firewalls), and networking protocols like TCP/IP and DNS. Additionally, it introduces subnetting, ports, and essential cybersecurity tools, along with installation guidance for tools like Kali Linux and Wireshark.

Uploaded by

omotosodanielle
Copyright
© © All Rights Reserved
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 18

Network

Basics
Presented by: Godsent
Ebhohimen
Cybersecurity
Analyst
WHAT IS A NETWORK?

A network is a group of
interconnected devices (such
as computer, server, printer
or smart phones) that
communicate with each other
to share resources, exchange
data, and provide services.

Example: When you send a


message or watch a YouTube
video, your device uses a 01
TYPES OF NETWORKS
• LOCAL AREA NETWORK (LAN)
Small network like in your home or
office.
Devices connect to a single router or
switch.
Example: Your home Wi-Fi.

• WIDE AREA NETWORK (WAN)


Larger network covering cities,
countries, or
02
even the world.
NETWORK
COMPONENTS I

SWITCHES
Networking device that connects
two or more device in one network
domain.

ROUTERS
Networking device that
connects different domains
and routes IP packets to
correct destination.
03
NETWORK COMPONENTS II

Firewalls Access Points


A firewall is a network security Like Switches, APs are the wireless
device that monitors incoming destination for a host to
and outgoing network traffic communicate with other hosts.
and decides whether to allow or
block specific traffic based on a
defined set of security rules.

04
The Journey of Data
Packets
Data is broken into tiny pieces called
packets.
Packets travel through devices like
routers to reach their destination.

IP Address
Every device has a unique "home
address" called an IP address. It tells
the network where to send data.

Example: Like sending a letter:


IP address = recipient's home.
Packet = letter content. 05
Networking Protocols
A network protocol is a set of rules that defines how devices
communicate over a network. It ensures data is transmitted
correctly
Think and as
of them reliably.
the languages of networks.
Without protocols, devices wouldn’t understand each other.
Examples: TCP/IP, DNS, HTTP/HTTPS.

06
How TCP/IP Works
Transmission Control Protocol
(TCP)
• Splits data into packets and
ensures they arrive
correctly.
• Like a reliable delivery
person checking every item.
IP (Internet Protocol):
• Handles addressing and
routing packets to the right
destination.
• Like the address on a package.
07
DNS and HTTP/HTTPS
Studio Shodwe

Domain Name System (DNS)


• Translates domain names (e.g.,
google.com) into IP addresses.
• Like a phonebook for the internet.
HyperText Transfer Protocol (HTTP)
• Transfers data (like webpages)
between your browser and
servers.
HTTPS (Secure HTTP)
• Adds encryption for security,
protecting data from hackers.
• Example: Online shopping or 08

banking.
IP Addressing

What is an IPaddress?
An IP address is like a home address for devices on a
network. It tells other devices where to send data.
Types
• IPv4: Four numbers separated by dots (e.g.,
192.168.1.1).
• IPv6: Longer format, designed to provide more
addresses (e.g., 2001:0db8:85a3::8a2e:0370:7334).
Example: Your computer’s IP address helps websites
know where to send the data when you browse.

09
Subnetting Basics

What is Subnetting?
Subnetting divides a network into
smaller sections (subnetworks).

Advantages of Subnetting
• Improve performance by
reducing congestion.
• Enhance security by isolating
sections.
• Efficiently use IP addresses.

Example: Imagine splitting a large 10

classroom into smaller groups for


How Subnetting Works
Subnet Mask
A tool that defines which part of an IP address
is the network and which part is the host.
Example: 255.255.255.0
CIDR Notation
A shorthand for subnet masks (e.g., /24).
Example in Action:
Network: 192.168.1.0/24
Subnet
Splits this into smaller groups, like
192.168.1.0/26.
11
Understanding Ports

What are Ports in Networking?


Ports are virtual doors on a device that allow specific types
of data to come in or go out.
• Each port is identified by a number (0 to 65535).
• Think of them like apartment numbers in a building—
each one leads to a specific service or application.
Example:
• Port 80 = HTTP (web browsing).
• Port 25 = Email (SMTP).

12
Common Ports You Should Know

Well-Known Ports for Cybersecurity


• Port 20/21: FTP (File Transfer Protocol) – For transferring
files.
• Port 22: SSH (Secure Shell) – Secure remote access.
• Port 25: SMTP (Simple Mail Transfer Protocol) – Sending
emails.
• Port 53: DNS (Domain Name System) – Resolves domain
names to IPs.
• Port 80: HTTP – Web browsing (unsecured).
• Port 443: HTTPS – Secure web browsing.
• Port 3389: RDP (Remote Desktop Protocol) – Remote
desktop connections. 13
Introduction to Cybersecurity
Tools
Essential Tools for Aspiring Cybersecurity Professional
Kali Linux
• Purpose: A penetration testing and ethical hacking OS.
• Why Use It: Comes pre-installed with tools for vulnerability scanning,
password cracking, and more.
VMware:
• Purpose: A platform for creating and managing virtual machines.
• Why Use It: Enables safe testing environments without affecting your
physical machine.
Wireshark:
• Purpose: A network protocol analyzer to monitor and inspect traffic.
• Why Use It: Helps identify network issues and detect suspicious activity.
Nmap (Network Mapper):
• Purpose: A tool for network discovery and security auditing.
14
Why Use It: Scans open ports, services, and vulnerabilities in networks.
Installing Cybersecurity Tools Part 1

How to Install Kali Linux and VMware


Kali Linux Installation
⚬ Option 1: Install as a virtual machine.
■ Download the ISO or pre-built VM image
from kali.org.
■ Import it into VMware or VirtualBox.
⚬ Option 2: Install on a physical machine.
■ Create a bootable USB with tools like Rufus.
■ Boot from the USB and follow the installation
prompts.
VMware Installation
⚬ Download VMware Workstation Player or Pro from
vmware.com. 15
Installing Cybersecurity Tools Part 2

How to Install Wireshark and Nmap


Wireshark Installation:
⚬ Download the installer from wireshark.org.
⚬ Run the installer and follow the setup wizard for your OS
(Windows, macOS, or Linux).
⚬ Pro Tip: Install additional drivers if prompted to capture live traffic.
Nmap Installation:
⚬ For Windows: Download the installer from nmap.org and
complete the setup.
⚬ For Linux: Use the terminal:
■ Debian/Ubuntu: sudo apt install nmap
■ Red Hat/Fedora: sudo dnf install nmap 16
Assignment
Research and prepare a one-page
summary of one common type of cyber
threat (e.g., phishing, ransomware) and its
potential impact on individuals and
organizations.

17

You might also like