IP addresses may uniquely identify each system on a network, but those systems may be responsible for running many different services. That’s where network ports come into play. Network ports are particular locations on a system associated with a specific application. In this video, learn how network ports function and the common network ports included on the exam.
- [Narrator] IP addresses may uniquely identify…each system on a network,…but those systems may be responsible…for running many different services.…That's where network ports come into play.…Network ports are particular locations on a system…associated with a specific application.…Imagine that each computer on the network…is an apartment building…and each application is an individual apartment.…The IP address on the computer is like…the street address on the apartment building.…But once you arrive at the building,…you need specific instructions…to get to the right apartment.…
The network port is like the apartment number,…guiding traffic to the correct application.…Network ports are represented using a 16-bit binary number.…When we write that out in decimal form…we have two to the 16th power, or 65,536 possible values.…Just as with IP addresses, we start counting at zero,…so port numbers may range from zero to 65,535.…Different ranges of ports are used in different ways.…
Ports between zero and 1,203…are known as the well-known ports.…
Looking for study partners?Join the CISSP Exam study group
The Certified Information System Security Professional (CISSP) certification is an important component of any security professional's resume, and is a requirement for many top jobs. In this course, prepare for the fourth domain of the exam: Communications and Network Security. Instructor and cybersecurity expert Mike Chapple goes over TCP/IP networking, network security devices, and secure network design. Mike also includes coverage of specialized networking, network attacks, wireless networking, and more. The CISSP exam domains can be found here.
- How IP addresses are assigned and managed
- Multilayer protocols
- VPNs and VPN concentrators
- Designing secure networks
- Firewall management techniques
- Maintaining network availability
- Software defined networking (SDN)
- Port isolation
- Network attacks
- How Wi-Fi networks function
- WPA, WPS, and propagation attacks
- Host-based network security control
Skill Level Advanced
Insights from a Cybersecurity Professionalwith Mike Chapple32m 15s Intermediate
1. TCP/IP Networking
2. Network Security Devices
3. Designing Secure Networks
4. Specialized Networking
5. Secure Network Management
6. Virtualized Networks
Port isolation1m 47s
7. Network Attacks
8. Transport Encryption
9. Wireless Networking
10. Host Security
- Mark as unwatched
- Mark all as unwatched
Are you sure you want to mark all the videos in this course as unwatched?
This will not affect your course history, your reports, or your certificates of completion for this course.Cancel
Take notes with your new membership!
Type in the entry box, then click Enter to save your note.
1:30Press on any video thumbnail to jump immediately to the timecode shown.
Notes are saved with you account but can also be exported as plain text, MS Word, PDF, Google Doc, or Evernote.