sundry/ghetto/notes/NetworkSecurity/notes.txt
2016-12-22 18:26:26 -07:00

67 lines
2.6 KiB
Plaintext

Class on 11/15, 11/17 then break and resume on 12/1
Link to look at: https://app.box.com/s/8tso8h5kerhy83qipb4bujkpc4bj0eoq
Game plan:
11/15 Night 1: Grab docs, discussion on syllabus
11/17 Night 2: Basic networking and IP addressing
12/01 Night 3: Basic/Advanced networking, intro to hardware configuration (firewalls)
12/06 Night 4: Network security design (part 1) plus Operating Systems basics, possibly even web security
12/08 Night 5: Network security design (part 2) plus basics of IDS, IPS, HIDS
12/13 Night 6: Wrap up of all covered topics
11/15
Can't protect it, unless you understand how it moves.
discussion about how this meeting works at the networking layer:
Starts with discussion with the 7 layer OSI model (https://mplsnet.files.wordpress.com/2014/06/osi-model.gif)
Every layer of the OSI model adds its own header, Data layer also adds a footer.
Physical layer doesn't add any overhead because it's the bottom layer
Top 3 layers (application, presentation, session) are the data. In the TCP/IP model this is the application layer
Layer 4 (transport) are the segments, TCP/IP is also transport
Layer 3 (network) is the packets, TCP/IP is the Internet layer
Layer 2 (data link) is the frames and part of the TCP/IP Network Access layer
Layer 1 (physical) comprises the bits and is the other part of the TCP/IP Network Access layer
Homework:
Chapter 1 & 2 of CompTIA network+
Joke:
(q) You're being chased by a group of clowns, what do you do when you turn around to confront them?
(a) Go for the juggler
11/17
Node: Any device that carries an IP address
OSI Model Continued:
Physical is concerned with the transmission of data on the network
Data Link Layer
2 parts:
MAC - Media Access Control
physical addressing, logical topology, method of transmitting on the media
LLC - Logical Link Control
connection services, synchronizing transmissions
Homework:
Read through remainder of chapter 2, chapter 3 (specifically the Network Infrastruction Devices)
12/01
Discussion on Gen1 firewalls, (routers) filter based on macs, ips, networks, ports
Gen3 firewalls - stateful packet inspecting, much better but can be circumnavigated
IDS (&NIDS/HIDS)
Way too much time spent on binary math (subnetting)
12/06
Nothing worth noting...
Primarily a 3 hour discussion covering how bit math on addresses and routes is used for security.
12/08 - Cancelled
12/13
Policies, Standards, Governance and Guidelines. Guidelines are last in line.
How important is remote access to your customer?
SSL/TLS, -> TLS Ephemeral keys are the way to go