Cyber Security Networking Basics

🌐 Cyber Security Networking Basics (Beginner Friendly)

Networking is the backbone of Cyber Security.

👉 If you understand networking well, 50% of hacking & defense concepts become easy.


 What is Computer Networking?

A network is a collection of devices (computers, mobiles, servers) connected to:

  • Share data

  • Communicate

  • Access the internet

📌 In cyber security, attacks happen through networks.


 Why Networking is Important in Cyber Security?

  • Hackers exploit network weaknesses

  • Security teams protect network traffic

  • Every attack uses IP, ports, and protocols


Cyber Security Networking Basics Components

1️⃣ IP Address

A unique address for devices on a network.

Types

  • IPv4 → 192.168.1.1

  • IPv6 → 2001:db8::1


2️⃣ MAC Address

Permanent hardware address of a device
Example: 00:1A:2B:3C:4D:5E


3️⃣ Port Numbers

Used to identify services running on a system.

PortService
80HTTP
443HTTPS
21FTP
22SSH
25SMTP

📌 Hackers scan ports to find open services.


4️⃣ Protocols (Very Important)

ProtocolPurpose
TCPReliable communication
UDPFast but unreliable
HTTP/HTTPSWeb traffic
FTPFile transfer
SSHSecure remote login
DNSDomain name to IP

 OSI Model (7 Layers)

LayerNameSecurity View
7ApplicationWeb attacks
6PresentationEncryption
5SessionSession hijacking
4TransportTCP/UDP
3NetworkIP spoofing
2Data LinkMAC spoofing
1PhysicalCable damage

📌 Hackers attack different layers.


 TCP/IP Model (Simplified)

LayerExample
ApplicationHTTP, FTP
TransportTCP, UDP
InternetIP
Network AccessEthernet

 Important Networking Devices

DevicePurpose
RouterConnects networks
SwitchConnects devices
HubBroadcasts data
FirewallBlocks attacks
IDS/IPSDetects intrusions

 Common Network Attacks (Basics)

  • Port Scanning

  • IP Spoofing

  • ARP Poisoning

  • DDoS Attack

  • Man-in-the-Middle


 Networking Commands (Linux / Windows)

ipconfig # Windows IP info
ifconfig # Linux IP info
ping google.com
tracert google.com
netstat -an

 Networking Tools for Cyber Security

ToolUse
NmapNetwork scanning
WiresharkPacket capture
tcpdumpTraffic analysis
NetcatNetwork utility

🎯 Learning Roadmap (Perfect for You)

1️⃣ IP, Ports, Protocols
2️⃣ OSI & TCP/IP Models
3️⃣ Linux Networking Commands
4️⃣ Network Attacks
5️⃣ Firewalls & IDS
6️⃣ Practical tools (Nmap, Wireshark)


📌 Exam & Career Tip

✔ Asked in CEH, Security+, college exams
✔ Mandatory for Ethical Hacking & SOC jobs

📌 No networking = No cyber security

You may also like...