Cyber Security Networking Basics
🌐 Cyber Security Networking Basics (Beginner Friendly)
👉 If you understand networking well, 50% of hacking & defense concepts become easy.
What is Computer Networking?
A network is a collection of devices (computers, mobiles, servers) connected to:
Share data
Communicate
Access the internet
📌 In cyber security, attacks happen through networks.
Why Networking is Important in Cyber Security?
Hackers exploit network weaknesses
Security teams protect network traffic
Every attack uses IP, ports, and protocols
Cyber Security Networking Basics Components
1️⃣ IP Address
A unique address for devices on a network.
Types
IPv4 →
192.168.1.1IPv6 →
2001:db8::1
2️⃣ MAC Address
Permanent hardware address of a device
Example: 00:1A:2B:3C:4D:5E
3️⃣ Port Numbers
Used to identify services running on a system.
| Port | Service |
|---|---|
| 80 | HTTP |
| 443 | HTTPS |
| 21 | FTP |
| 22 | SSH |
| 25 | SMTP |
📌 Hackers scan ports to find open services.
4️⃣ Protocols (Very Important)
| Protocol | Purpose |
|---|---|
| TCP | Reliable communication |
| UDP | Fast but unreliable |
| HTTP/HTTPS | Web traffic |
| FTP | File transfer |
| SSH | Secure remote login |
| DNS | Domain name to IP |
OSI Model (7 Layers)
| Layer | Name | Security View |
|---|---|---|
| 7 | Application | Web attacks |
| 6 | Presentation | Encryption |
| 5 | Session | Session hijacking |
| 4 | Transport | TCP/UDP |
| 3 | Network | IP spoofing |
| 2 | Data Link | MAC spoofing |
| 1 | Physical | Cable damage |
📌 Hackers attack different layers.
TCP/IP Model (Simplified)
| Layer | Example |
|---|---|
| Application | HTTP, FTP |
| Transport | TCP, UDP |
| Internet | IP |
| Network Access | Ethernet |
Important Networking Devices
| Device | Purpose |
|---|---|
| Router | Connects networks |
| Switch | Connects devices |
| Hub | Broadcasts data |
| Firewall | Blocks attacks |
| IDS/IPS | Detects intrusions |
Common Network Attacks (Basics)
Port Scanning
IP Spoofing
ARP Poisoning
DDoS Attack
Man-in-the-Middle
Networking Commands (Linux / Windows)
Networking Tools for Cyber Security
| Tool | Use |
|---|---|
| Nmap | Network scanning |
| Wireshark | Packet capture |
| tcpdump | Traffic analysis |
| Netcat | Network utility |
🎯 Learning Roadmap (Perfect for You)
1️⃣ IP, Ports, Protocols
2️⃣ OSI & TCP/IP Models
3️⃣ Linux Networking Commands
4️⃣ Network Attacks
5️⃣ Firewalls & IDS
6️⃣ Practical tools (Nmap, Wireshark)
📌 Exam & Career Tip
✔ Asked in CEH, Security+, college exams
✔ Mandatory for Ethical Hacking & SOC jobs
📌 No networking = No cyber security
