IP addresses come in two forms: public addresses, which are assigned by a central network authority and may be used to reach systems located across the Internet, and private addresses, which are available for anyone’s use but may only be used on local networks and do not work across the Internet. In this video, learn the differences between public and private IP addresses and the use of Network Address Translation, or NAT.
- [Instructor] Networks carry all types of data over distances short and far. Whether it's a trans-atlantic video conference, or an email across the room, many different networks carry the ones and zeros that make communications work. Switches and routers are the core building blocks of these networks. Network engineers use switches to create networks. These are simple looking devices, such as the switch shown here, that contain a large number of network ports. Switches may be very small with eight or fewer ports, or they can be quite large with 500 or more ports.
The switch shown here is a typical 48 port switch. Switches are normally hidden away inside wiring closets and other secure locations. Each switch port is connected to one end of a network cable. Those cables then disappear into special pipes known as conduits for distribution around a building. When the cable reaches the final destination it usually terminates in a neat looking wall faceplate like the one shown here. This provides an easy way for users and technicians to connect and disconnect computers from the network without damaging the cables inside the wall or having unsightly unused wires lying around the room.
Some devices directly connect to switch ports through the use of wired networks. Many other devices don't use wires, but instead depend upon radio-based wireless networks. These networks are created by wireless access points like the one shown here. These APs, as they're called, contain radios that send and receive network signals to mobile devices. The AP itself has a wired connection back to the switch allowing wireless devices to connect to the rest of the network. Switches do create networks, but they're limited to creating local networks.
Routers play a higher lever roll, connecting networks together by serving as a central aggregation point for network traffic heading to or from a large network. The router serves as the air traffic controller of the network making decisions about the best paths for traffic to follow as it travels to its final destination. Routers also perform some security functions using access control lists to limit the traffic that may enter or leave a network based upon the organization's security policies.
Routers come in many different sizes engineered to support different size networks. These two network building blocks play an important roll in connecting systems together to create enterprise networks.
- How IP addresses are assigned and managed
- Multilayer protocols
- VPNs and VPN concentrators
- Designing secure networks
- Firewall management techniques
- Maintaining network availability
- Software defined networking (SDN)
- Port isolation
- Network attacks
- How Wi-Fi networks function
- WPA, WPS, and propagation attacks
- Host-based network security control
Skill Level Advanced
Insights from a Cybersecurity Professionalwith Mike Chapple32m 15s Intermediate
1. TCP/IP Networking
2. Network Security Devices
3. Designing Secure Networks
4. Specialized Networking
5. Secure Network Management
6. Virtualized Networks
Port isolation1m 47s
7. Network Attacks
8. Transport Encryption
9. Wireless Networking
10. Host Security
- Mark as unwatched
- Mark all as unwatched
Are you sure you want to mark all the videos in this course as unwatched?
This will not affect your course history, your reports, or your certificates of completion for this course.Cancel
Take notes with your new membership!
Type in the entry box, then click Enter to save your note.
1:30Press on any video thumbnail to jump immediately to the timecode shown.
Notes are saved with you account but can also be exported as plain text, MS Word, PDF, Google Doc, or Evernote.