Search for notes by fellow students, in your own course and all over the country.
Browse our notes for titles which look like what you need, you can preview any of the notes via a sample of the contents. After you're happy these are the notes you're after simply pop them into your shopping cart.
Document Preview
Extracts from the notes are below, to see the PDF you'll receive please use the links above
Delwin Thermitus
03/27/2022
Cyber Security
Summary Linux Command/ Computer & Networking
Intro To Virtualization
- Virtualization – is the process of digitally emulating hardware
...
- Setting up proper networking for our VM’s is critical to prevent your own machine from
being compromised
...
Navigation – Where am I
- Where am I: pwd (print working directory)
...
(List Segment)
- Take me there:
o Use the ‘cd’ command
...
= current directory (cd
...
= parent directory (cd
...
- To create a new directory we use the ‘mkdir’ command
...
Copy Files
- We can use the ‘cp’ command to copy a file
...
-
We need to use ‘rmdir’ to remove folders
...
Viewing Contents Of A File
- To view the contents of a particular file you can use the ‘cat’ command
...
It
takes multiple arguments including the names of each of the files you would like
to spill out
...
▪ The first is the directory you want to look inside
...
▪ Find has many options for finding based on size, name and more
...
▪ Uses database/cache to quickly store where a file is located
...
o Which: takes another command as an argument and will tell you where the
binary for that command lives in the file system
...
Grep
OSI Model
- What is an OSI Model?
o Open System Interconnection Model
...
▪ Is a conceptual model that standardizes communications between
computers
...
Physical
2
...
Network
4
...
Session
6
...
Application
Layer 1 – Physical
- Physical and Electric components
- PDU: Bits
o 1’s & 0’s
o Transmits raw data ‘bits’ are sent between physical devices
...
o Network adaptors
...
o Electrical cables
...
Layer 2 – Data Link
- Switching Layer
o Logical Link Control (LLC)
▪ Error and flow control
...
II, Ethernet
...
Protocols
o IP(internet Protocol), ICMP(Internet Control Message Protocol), ARP
Hardware
o Routers
Layer 4 – Transport
- Protocols
o TCP (Transmission Control Protocol): connection oriented
o UDP (User Datagram Protocol): connection - less
- The post office layer
o Port numbers
o Multiplexing to different ports
o End-to-end service
o Message delivery mechanism
o Flow control
o Error recovery
- PDU: Segments/ Datagrams
o TCP Segments
o UDP Datagrams
Layer 5 – Session
- Communication management
o Establish/ Maintain/ Terminate sessions
o Syncs multip le transport layer connections and sends them to ports
...
- Protocols
o SSL, TLS, MIME
- Data formats
o ASCII,UNICODE, GIF, JPEG, MP3, HTML
Layer 7 – Application
- End – User Layer
o Human – computer interactions
o Programs receive what was sent
-
o Or Create what will be sent
Where applicants access Network Services
Protocols
o HTTP/S, DNS, SMTP, Email, FTP, Telnet, SSH(Secure Shell)
Software
o Broswers, Email clients, User apps
...
8c:2d:aa : 4b:98:a7
Network Address
- IP Address
o Every device on a network needs a unique IP Address
o Handled by routers
- IPv4
o 4 Bytes long (32 bits)
o Represented in decimal
o Max value is 255, min is 0
- IPVv6
o 16 bytes long (128 bytes)
o Represented in hexa–decimals
o 340 undecillion addresses possible
o Groups of 0’s are abbreviated
▪ Ex
...
168
...
1
• Ex
...
IPv6 (compressed)
• Ex
...
255
...
0
...
255
...
0) – 64 thousand possible IP’s
o (24(255
...
255