# Firewalls and network security measures

# Firewalls and network security measures

<div class="cds-1 css-xl5mb3 cds-2" id="bkmrk-in-this-video%2C-you%27l"><div class="cds-1 rc-Paragraph css-1lz62pp cds-3 cds-grid-item"><div class="phrases"><div aria-label="toggle video from In this video, you'll" class="rc-Phrase css-ugczj4" data-cue="1" data-cue-index="0" role="button"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">In this video, you'll </span></div><div aria-label="toggle video from learn about different types of firewalls." class="rc-Phrase css-ugczj4" data-cue="2" data-cue-index="1" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">learn about different types of firewalls. </span></div><div aria-label="toggle video from These include hardware," class="rc-Phrase css-ugczj4" data-cue="3" data-cue-index="2" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">These include hardware, </span></div><div aria-label="toggle video from software, and cloud-based firewalls." class="rc-Phrase css-ugczj4" data-cue="4" data-cue-index="3" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">software, and cloud-based firewalls. </span></div><div aria-label="toggle video from You'll also learn the difference between" class="rc-Phrase css-ugczj4" data-cue="5" data-cue-index="4" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">You'll also learn the difference between </span></div><div aria-label="toggle video from a stateless and stateful firewall and" class="rc-Phrase css-ugczj4" data-cue="6" data-cue-index="5" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">a stateless and stateful firewall and </span></div><div aria-label="toggle video from cover some of the basic operations" class="rc-Phrase css-ugczj4" data-cue="7" data-cue-index="6" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">cover some of the basic operations </span></div><div aria-label="toggle video from that a firewall performs." class="rc-Phrase css-ugczj4" data-cue="8" data-cue-index="7" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">that a firewall performs. </span></div><div aria-label="toggle video from current lecture segment: Finally, you will explore how" class="rc-Phrase active css-ugczj4" data-cue="9" data-cue-index="8" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">Finally, you will explore how </span></div><div aria-label="toggle video from proxy servers are used to" class="rc-Phrase css-ugczj4" data-cue="10" data-cue-index="9" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">proxy servers are used to </span></div><div aria-label="toggle video from add a layer of security to the network." class="rc-Phrase css-ugczj4" data-cue="11" data-cue-index="10" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">add a layer of security to the network. </span></div></div></div></div><div class="cds-1 css-xl5mb3 cds-2" id="bkmrk-"><div class="cds-1 rc-Paragraph css-1lz62pp cds-3 cds-grid-item">  
</div></div><div class="cds-1 css-xl5mb3 cds-2" id="bkmrk-a-firewall-is-a-netw"><div class="cds-1 rc-Paragraph css-1lz62pp cds-3 cds-grid-item"><div class="phrases"><div aria-label="toggle video from A firewall is a network security device that" class="rc-Phrase css-ugczj4" data-cue="12" data-cue-index="11" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">A firewall is a network security device that </span></div><div aria-label="toggle video from monitors traffic to and from your network." class="rc-Phrase css-ugczj4" data-cue="13" data-cue-index="12" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">monitors traffic to and from your network. </span></div><div aria-label="toggle video from It either allows traffic or it blocks" class="rc-Phrase css-ugczj4" data-cue="14" data-cue-index="13" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">It either allows traffic or it blocks </span></div><div aria-label="toggle video from it based on a defined set of security rules." class="rc-Phrase css-ugczj4" data-cue="15" data-cue-index="14" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">it based on a defined set of security rules. </span></div><div aria-label="toggle video from A firewall can use port filtering," class="rc-Phrase css-ugczj4" data-cue="16" data-cue-index="15" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">A firewall can use port filtering, </span></div><div aria-label="toggle video from which blocks or allows" class="rc-Phrase css-ugczj4" data-cue="17" data-cue-index="16" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">which blocks or allows </span></div><div aria-label="toggle video from certain port numbers to limit unwanted communication." class="rc-Phrase css-ugczj4" data-cue="18" data-cue-index="17" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">certain port numbers to limit unwanted communication. </span></div><div aria-label="toggle video from For example, it could have a rule" class="rc-Phrase css-ugczj4" data-cue="19" data-cue-index="18" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">For example, it could have a rule </span></div><div aria-label="toggle video from that only allows communications on port" class="rc-Phrase css-ugczj4" data-cue="20" data-cue-index="19" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">that only allows communications on port </span></div><div aria-label="toggle video from 443 for HTTPS or port" class="rc-Phrase css-ugczj4" data-cue="21" data-cue-index="20" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">443 for HTTPS or port </span></div><div aria-label="toggle video from 25 for email and blocks everything else." class="rc-Phrase css-ugczj4" data-cue="22" data-cue-index="21" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">25 for email and blocks everything else. </span></div><div aria-label="toggle video from These firewall settings will be determined by" class="rc-Phrase css-ugczj4" data-cue="23" data-cue-index="22" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">These firewall settings will be determined by </span></div><div aria-label="toggle video from the organization's security policy." class="rc-Phrase css-ugczj4" data-cue="24" data-cue-index="23" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">the organization's security policy. </span></div></div></div></div><div class="cds-1 css-xl5mb3 cds-2" id="bkmrk--1"><div class="cds-1 rc-Paragraph css-1lz62pp cds-3 cds-grid-item">  
</div></div><div class="cds-1 css-xl5mb3 cds-2" id="bkmrk-let%27s-talk-about-a-f"><div class="cds-1 rc-Paragraph css-1lz62pp cds-3 cds-grid-item"><div class="phrases"><div aria-label="toggle video from Let's talk about a few different kinds of firewalls." class="rc-Phrase css-ugczj4" data-cue="25" data-cue-index="24" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">Let's talk about a few different kinds of firewalls. </span></div><div aria-label="toggle video from A hardware firewall is considered the most" class="rc-Phrase css-ugczj4" data-cue="26" data-cue-index="25" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">A hardware firewall is considered the most </span></div><div aria-label="toggle video from basic way to defend against threats to a network." class="rc-Phrase css-ugczj4" data-cue="27" data-cue-index="26" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">basic way to defend against threats to a network. </span></div><div aria-label="toggle video from A hardware firewall inspects" class="rc-Phrase css-ugczj4" data-cue="28" data-cue-index="27" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">A hardware firewall inspects </span></div><div aria-label="toggle video from each data packet before it's" class="rc-Phrase css-ugczj4" data-cue="29" data-cue-index="28" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">each data packet before it's </span></div><div aria-label="toggle video from allowed to enter the network." class="rc-Phrase css-ugczj4" data-cue="30" data-cue-index="29" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">allowed to enter the network. </span></div><div aria-label="toggle video from A software firewall performs" class="rc-Phrase css-ugczj4" data-cue="31" data-cue-index="30" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">A software firewall performs </span></div><div aria-label="toggle video from the same functions as a hardware firewall," class="rc-Phrase css-ugczj4" data-cue="32" data-cue-index="31" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">the same functions as a hardware firewall, </span></div><div aria-label="toggle video from but it's not a physical device." class="rc-Phrase css-ugczj4" data-cue="33" data-cue-index="32" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">but it's not a physical device. </span></div><div aria-label="toggle video from Instead, it's a software program" class="rc-Phrase css-ugczj4" data-cue="34" data-cue-index="33" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">Instead, it's a software program </span></div><div aria-label="toggle video from installed on a computer or on a server." class="rc-Phrase css-ugczj4" data-cue="35" data-cue-index="34" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">installed on a computer or on a server. </span></div><div aria-label="toggle video from If the software firewall is installed on a computer," class="rc-Phrase css-ugczj4" data-cue="36" data-cue-index="35" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">If the software firewall is installed on a computer, </span></div><div aria-label="toggle video from it will analyze all the traffic" class="rc-Phrase css-ugczj4" data-cue="37" data-cue-index="36" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">it will analyze all the traffic </span></div><div aria-label="toggle video from received by that computer." class="rc-Phrase css-ugczj4" data-cue="38" data-cue-index="37" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">received by that computer. </span></div><div aria-label="toggle video from If the software firewall is installed on a server," class="rc-Phrase css-ugczj4" data-cue="39" data-cue-index="38" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">If the software firewall is installed on a server, </span></div><div aria-label="toggle video from it will protect all the devices connected to the server." class="rc-Phrase css-ugczj4" data-cue="40" data-cue-index="39" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">it will protect all the devices connected to the server. </span></div><div aria-label="toggle video from A software firewall typically costs" class="rc-Phrase css-ugczj4" data-cue="41" data-cue-index="40" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">A software firewall typically costs </span></div><div aria-label="toggle video from less than purchasing a separate physical device," class="rc-Phrase css-ugczj4" data-cue="42" data-cue-index="41" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">less than purchasing a separate physical device, </span></div><div aria-label="toggle video from and it doesn't take up any extra space." class="rc-Phrase css-ugczj4" data-cue="43" data-cue-index="42" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">and it doesn't take up any extra space. </span></div><div aria-label="toggle video from But because it is a software program," class="rc-Phrase css-ugczj4" data-cue="44" data-cue-index="43" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">But because it is a software program, </span></div><div aria-label="toggle video from it will add some processing burden" class="rc-Phrase css-ugczj4" data-cue="45" data-cue-index="44" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">it will add some processing burden </span></div><div aria-label="toggle video from to the individual devices." class="rc-Phrase css-ugczj4" data-cue="46" data-cue-index="45" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">to the individual devices. </span></div></div></div></div><div class="cds-1 css-xl5mb3 cds-2" id="bkmrk--2"><div class="cds-1 rc-Paragraph css-1lz62pp cds-3 cds-grid-item">  
</div></div><div class="cds-1 css-xl5mb3 cds-2" id="bkmrk-organizations-may-ch"><div class="cds-1 rc-Paragraph css-1lz62pp cds-3 cds-grid-item"><div class="phrases"><div aria-label="toggle video from Organizations may choose to use a cloud-based firewall." class="rc-Phrase css-ugczj4" data-cue="47" data-cue-index="46" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">Organizations may choose to use a cloud-based firewall. </span></div><div aria-label="toggle video from Cloud service providers offer firewalls as" class="rc-Phrase css-ugczj4" data-cue="48" data-cue-index="47" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">Cloud service providers offer firewalls as </span></div><div aria-label="toggle video from a service, or FaaS, for organizations." class="rc-Phrase css-ugczj4" data-cue="49" data-cue-index="48" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">a service, or FaaS, for organizations. </span></div><div aria-label="toggle video from Cloud-based firewalls are software firewalls" class="rc-Phrase css-ugczj4" data-cue="50" data-cue-index="49" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">Cloud-based firewalls are software firewalls </span></div><div aria-label="toggle video from hosted by a cloud service provider." class="rc-Phrase css-ugczj4" data-cue="51" data-cue-index="50" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">hosted by a cloud service provider. </span></div><div aria-label="toggle video from Organizations can configure the firewall rules" class="rc-Phrase css-ugczj4" data-cue="52" data-cue-index="51" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">Organizations can configure the firewall rules </span></div><div aria-label="toggle video from on the cloud service provider's interface," class="rc-Phrase css-ugczj4" data-cue="53" data-cue-index="52" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">on the cloud service provider's interface, </span></div><div aria-label="toggle video from and the firewall will perform security operations on" class="rc-Phrase css-ugczj4" data-cue="54" data-cue-index="53" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">and the firewall will perform security operations on </span></div><div aria-label="toggle video from all incoming traffic before" class="rc-Phrase css-ugczj4" data-cue="55" data-cue-index="54" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">all incoming traffic before </span></div><div aria-label="toggle video from it reaches the organization’s onsite network." class="rc-Phrase css-ugczj4" data-cue="56" data-cue-index="55" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">it reaches the organization’s onsite network. </span></div><div aria-label="toggle video from Cloud-based firewalls also protect any assets or" class="rc-Phrase css-ugczj4" data-cue="57" data-cue-index="56" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">Cloud-based firewalls also protect any assets or </span></div><div aria-label="toggle video from processes that an organization" class="rc-Phrase css-ugczj4" data-cue="58" data-cue-index="57" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">processes that an organization </span></div><div aria-label="toggle video from might be using in the cloud." class="rc-Phrase css-ugczj4" data-cue="59" data-cue-index="58" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">might be using in the cloud. </span></div></div></div></div><div class="cds-1 css-xl5mb3 cds-2" id="bkmrk--3"><div class="cds-1 rc-Paragraph css-1lz62pp cds-3 cds-grid-item">  
</div></div><div class="cds-1 css-xl5mb3 cds-2" id="bkmrk-all-the-firewalls-we"><div class="cds-1 rc-Paragraph css-1lz62pp cds-3 cds-grid-item"><div class="phrases"><div aria-label="toggle video from All the firewalls we have discussed can be" class="rc-Phrase css-ugczj4" data-cue="60" data-cue-index="59" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">All the firewalls we have discussed can be </span></div><div aria-label="toggle video from either stateful or stateless." class="rc-Phrase css-ugczj4" data-cue="61" data-cue-index="60" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">either stateful or stateless. </span></div><div aria-label="toggle video from The terms "stateful" and "stateless"" class="rc-Phrase css-ugczj4" data-cue="62" data-cue-index="61" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">The terms "stateful" and "stateless" </span></div><div aria-label="toggle video from refer to how the firewall operates." class="rc-Phrase css-ugczj4" data-cue="63" data-cue-index="62" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">refer to how the firewall operates. </span></div><div aria-label="toggle video from Stateful refers to a class" class="rc-Phrase css-ugczj4" data-cue="64" data-cue-index="63" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">Stateful refers to a class </span></div><div aria-label="toggle video from of firewall that keeps track of" class="rc-Phrase css-ugczj4" data-cue="65" data-cue-index="64" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">of firewall that keeps track of </span></div><div aria-label="toggle video from information passing through it" class="rc-Phrase css-ugczj4" data-cue="66" data-cue-index="65" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">information passing through it </span></div><div aria-label="toggle video from and proactively filters out threats." class="rc-Phrase css-ugczj4" data-cue="67" data-cue-index="66" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">and proactively filters out threats. </span></div><div aria-label="toggle video from A stateful firewall analyzes" class="rc-Phrase css-ugczj4" data-cue="68" data-cue-index="67" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">A stateful firewall analyzes </span></div><div aria-label="toggle video from network traffic for characteristics and" class="rc-Phrase css-ugczj4" data-cue="69" data-cue-index="68" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">network traffic for characteristics and </span></div><div aria-label="toggle video from behavior that appear suspicious" class="rc-Phrase css-ugczj4" data-cue="70" data-cue-index="69" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">behavior that appear suspicious </span></div><div aria-label="toggle video from and stops them from entering the network." class="rc-Phrase css-ugczj4" data-cue="71" data-cue-index="70" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">and stops them from entering the network. </span></div><div aria-label="toggle video from Stateless refers to a class" class="rc-Phrase css-ugczj4" data-cue="72" data-cue-index="71" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">Stateless refers to a class </span></div><div aria-label="toggle video from of firewall that operates based on" class="rc-Phrase css-ugczj4" data-cue="73" data-cue-index="72" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">of firewall that operates based on </span></div><div aria-label="toggle video from predefined rules and does not" class="rc-Phrase css-ugczj4" data-cue="74" data-cue-index="73" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">predefined rules and does not </span></div><div aria-label="toggle video from keep track of information from data packets." class="rc-Phrase css-ugczj4" data-cue="75" data-cue-index="74" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">keep track of information from data packets. </span></div><div aria-label="toggle video from A stateless firewall only acts according to" class="rc-Phrase css-ugczj4" data-cue="76" data-cue-index="75" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">A stateless firewall only acts according to </span></div><div aria-label="toggle video from preconfigured rules set by the firewall administrator." class="rc-Phrase css-ugczj4" data-cue="77" data-cue-index="76" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">preconfigured rules set by the firewall administrator. </span></div><div aria-label="toggle video from The rules programmed by the firewall administrator tell" class="rc-Phrase css-ugczj4" data-cue="78" data-cue-index="77" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">The rules programmed by the firewall administrator tell </span></div><div aria-label="toggle video from the device what to accept and what to reject." class="rc-Phrase css-ugczj4" data-cue="79" data-cue-index="78" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">the device what to accept and what to reject. </span></div><div aria-label="toggle video from A stateless firewall doesn't store analyzed information." class="rc-Phrase css-ugczj4" data-cue="80" data-cue-index="79" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">A stateless firewall doesn't store analyzed information. </span></div><div aria-label="toggle video from It also doesn't discover" class="rc-Phrase css-ugczj4" data-cue="81" data-cue-index="80" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">It also doesn't discover </span></div><div aria-label="toggle video from suspicious trends like a stateful firewall does." class="rc-Phrase css-ugczj4" data-cue="82" data-cue-index="81" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">suspicious trends like a stateful firewall does. </span></div><div aria-label="toggle video from For this reason, stateless firewalls are considered" class="rc-Phrase css-ugczj4" data-cue="83" data-cue-index="82" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">For this reason, stateless firewalls are considered </span></div><div aria-label="toggle video from less secure than stateful firewalls." class="rc-Phrase css-ugczj4" data-cue="84" data-cue-index="83" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">less secure than stateful firewalls. </span></div></div></div></div><div class="cds-1 css-xl5mb3 cds-2" id="bkmrk--4"><div class="cds-1 rc-Paragraph css-1lz62pp cds-3 cds-grid-item">  
</div></div><div class="cds-1 css-xl5mb3 cds-2" id="bkmrk-a-next-generation-fi"><div class="cds-1 rc-Paragraph css-1lz62pp cds-3 cds-grid-item"><div class="phrases"><div aria-label="toggle video from A next generation firewall, or NGFW," class="rc-Phrase css-ugczj4" data-cue="85" data-cue-index="84" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">A next generation firewall, or NGFW, </span></div><div aria-label="toggle video from provides even more security than a stateful firewall." class="rc-Phrase css-ugczj4" data-cue="86" data-cue-index="85" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">provides even more security than a stateful firewall. </span></div><div aria-label="toggle video from Not only does an NGFW provide" class="rc-Phrase css-ugczj4" data-cue="87" data-cue-index="86" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">Not only does an NGFW provide </span></div><div aria-label="toggle video from stateful inspection of incoming and outgoing traffic," class="rc-Phrase css-ugczj4" data-cue="88" data-cue-index="87" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">stateful inspection of incoming and outgoing traffic, </span></div><div aria-label="toggle video from but it also performs more" class="rc-Phrase css-ugczj4" data-cue="89" data-cue-index="88" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">but it also performs more </span></div><div aria-label="toggle video from in-depth security functions like" class="rc-Phrase css-ugczj4" data-cue="90" data-cue-index="89" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">in-depth security functions like </span></div><div aria-label="toggle video from deep packet inspection and intrusion protection." class="rc-Phrase css-ugczj4" data-cue="91" data-cue-index="90" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">deep packet inspection and intrusion protection. </span></div><div aria-label="toggle video from Some NGFWs connect to" class="rc-Phrase css-ugczj4" data-cue="92" data-cue-index="91" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">Some NGFWs connect to </span></div><div aria-label="toggle video from cloud-based threat intelligence services" class="rc-Phrase css-ugczj4" data-cue="93" data-cue-index="92" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">cloud-based threat intelligence services </span></div><div aria-label="toggle video from so they can quickly update to" class="rc-Phrase css-ugczj4" data-cue="94" data-cue-index="93" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">so they can quickly update to </span></div><div aria-label="toggle video from protect against emerging cyber threats." class="rc-Phrase css-ugczj4" data-cue="95" data-cue-index="94" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">protect against emerging cyber threats. </span></div></div></div></div><div class="cds-1 css-xl5mb3 cds-2" id="bkmrk--5"><div class="cds-1 rc-Paragraph css-1lz62pp cds-3 cds-grid-item">  
</div></div><div class="phrases" id="bkmrk-now-you-have-a-basic"><div aria-label="toggle video from Now you have a basic understanding" class="rc-Phrase css-ugczj4" data-cue="96" data-cue-index="95" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">Now you have a basic understanding </span></div><div aria-label="toggle video from of firewalls and how they work." class="rc-Phrase css-ugczj4" data-cue="97" data-cue-index="96" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">of firewalls and how they work. </span></div><div aria-label="toggle video from We learned that firewalls can be hardware or software." class="rc-Phrase css-ugczj4" data-cue="98" data-cue-index="97" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">We learned that firewalls can be hardware or software. </span></div><div aria-label="toggle video from We also discussed the difference between" class="rc-Phrase css-ugczj4" data-cue="99" data-cue-index="98" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">We also discussed the difference between </span></div><div aria-label="toggle video from a stateless and stateful firewall" class="rc-Phrase css-ugczj4" data-cue="100" data-cue-index="99" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">a stateless and stateful firewall </span></div><div aria-label="toggle video from and the security benefits of a stateful firewall." class="rc-Phrase css-ugczj4" data-cue="101" data-cue-index="100" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">and the security benefits of a stateful firewall. </span></div><div aria-label="toggle video from Finally, we discussed next generation firewalls" class="rc-Phrase css-ugczj4" data-cue="102" data-cue-index="101" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">Finally, we discussed next generation firewalls </span></div><div aria-label="toggle video from and the security benefits they provide." class="rc-Phrase css-ugczj4" data-cue="103" data-cue-index="102" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">and the security benefits they provide. </span></div><div aria-label="toggle video from Coming up, we'll learn more about virtual networks." class="rc-Phrase css-ugczj4" data-cue="104" data-cue-index="103" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">Coming up, we'll learn more about virtual networks. </span></div></div>

# Virtual private networks (VPNs)

<div class="cds-1 css-xl5mb3 cds-2" id="bkmrk-in-this-video%2C-we%27re"><div class="cds-1 rc-Paragraph css-1lz62pp cds-3 cds-grid-item"><div class="phrases"><div aria-label="toggle video from In this video, we're going to" class="rc-Phrase css-ugczj4" data-cue="1" data-cue-index="0" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">In this video, we're going to </span></div><div aria-label="toggle video from discuss how virtual private networks," class="rc-Phrase css-ugczj4" data-cue="2" data-cue-index="1" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">discuss how virtual private networks, </span></div><div aria-label="toggle video from or VPNs, add security to your network." class="rc-Phrase css-ugczj4" data-cue="3" data-cue-index="2" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">or VPNs, add security to your network. </span></div><div aria-label="toggle video from When you connect to the internet," class="rc-Phrase css-ugczj4" data-cue="4" data-cue-index="3" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">When you connect to the internet, </span></div><div aria-label="toggle video from your internet service provider receives" class="rc-Phrase css-ugczj4" data-cue="5" data-cue-index="4" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">your internet service provider receives </span></div><div aria-label="toggle video from your network's requests and" class="rc-Phrase css-ugczj4" data-cue="6" data-cue-index="5" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">your network's requests and </span></div><div aria-label="toggle video from forwards it to the correct destination server." class="rc-Phrase css-ugczj4" data-cue="7" data-cue-index="6" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">forwards it to the correct destination server. </span></div><div aria-label="toggle video from But your internet requests" class="rc-Phrase css-ugczj4" data-cue="8" data-cue-index="7" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">But your internet requests </span></div><div aria-label="toggle video from include your private information." class="rc-Phrase css-ugczj4" data-cue="9" data-cue-index="8" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">include your private information. </span></div><div aria-label="toggle video from That means if the traffic gets intercepted," class="rc-Phrase css-ugczj4" data-cue="10" data-cue-index="9" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">That means if the traffic gets intercepted, </span></div><div aria-label="toggle video from someone could potentially connect your internet activity" class="rc-Phrase css-ugczj4" data-cue="11" data-cue-index="10" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">someone could potentially connect your internet activity </span></div><div aria-label="toggle video from with your physical location" class="rc-Phrase css-ugczj4" data-cue="12" data-cue-index="11" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">with your physical location </span></div><div aria-label="toggle video from and your personal information." class="rc-Phrase css-ugczj4" data-cue="13" data-cue-index="12" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">and your personal information. </span></div><div aria-label="toggle video from This includes some information" class="rc-Phrase css-ugczj4" data-cue="14" data-cue-index="13" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">This includes some information </span></div><div aria-label="toggle video from that you want to keep private," class="rc-Phrase css-ugczj4" data-cue="15" data-cue-index="14" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">that you want to keep private, </span></div><div aria-label="toggle video from like bank accounts and credit card numbers." class="rc-Phrase css-ugczj4" data-cue="16" data-cue-index="15" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">like bank accounts and credit card numbers. </span></div><div aria-label="toggle video from A virtual private network," class="rc-Phrase css-ugczj4" data-cue="17" data-cue-index="16" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">A virtual private network, </span></div><div aria-label="toggle video from also known as a VPN," class="rc-Phrase css-ugczj4" data-cue="18" data-cue-index="17" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">also known as a VPN, </span></div><div aria-label="toggle video from is a network security service that changes" class="rc-Phrase css-ugczj4" data-cue="19" data-cue-index="18" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">is a network security service that changes </span></div><div aria-label="toggle video from your public IP address and hides" class="rc-Phrase css-ugczj4" data-cue="20" data-cue-index="19" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">your public IP address and hides </span></div><div aria-label="toggle video from your virtual location so that you can keep your data" class="rc-Phrase css-ugczj4" data-cue="21" data-cue-index="20" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">your virtual location so that you can keep your data </span></div><div aria-label="toggle video from private when you're using a public" class="rc-Phrase css-ugczj4" data-cue="22" data-cue-index="21" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">private when you're using a public </span></div><div aria-label="toggle video from network like the internet." class="rc-Phrase css-ugczj4" data-cue="23" data-cue-index="22" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">network like the internet. </span></div></div></div></div><div class="cds-1 css-xl5mb3 cds-2" id="bkmrk-"><div class="cds-1 rc-Paragraph css-1lz62pp cds-3 cds-grid-item">  
</div></div><div class="cds-1 css-xl5mb3 cds-2" id="bkmrk-vpns-also-encrypt-yo"><div class="cds-1 rc-Paragraph css-1lz62pp cds-3 cds-grid-item"><div class="phrases"><div aria-label="toggle video from VPNs also encrypt your data as it" class="rc-Phrase css-ugczj4" data-cue="24" data-cue-index="23" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">VPNs also encrypt your data as it </span></div><div aria-label="toggle video from travels across the internet to preserve confidentiality." class="rc-Phrase css-ugczj4" data-cue="25" data-cue-index="24" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">travels across the internet to preserve confidentiality. </span></div><div aria-label="toggle video from A VPN service performs" class="rc-Phrase css-ugczj4" data-cue="26" data-cue-index="25" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">A VPN service performs </span></div><div aria-label="toggle video from encapsulation on your data in transit." class="rc-Phrase css-ugczj4" data-cue="27" data-cue-index="26" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">encapsulation on your data in transit. </span></div><div aria-label="toggle video from Encapsulation is a process performed" class="rc-Phrase css-ugczj4" data-cue="28" data-cue-index="27" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">Encapsulation is a process performed </span></div><div aria-label="toggle video from by a VPN service that protects" class="rc-Phrase css-ugczj4" data-cue="29" data-cue-index="28" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">by a VPN service that protects </span></div><div aria-label="toggle video from your data by wrapping" class="rc-Phrase css-ugczj4" data-cue="30" data-cue-index="29" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">your data by wrapping </span></div><div aria-label="toggle video from sensitive data in other data packets." class="rc-Phrase css-ugczj4" data-cue="31" data-cue-index="30" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">sensitive data in other data packets. </span></div><div aria-label="toggle video from Previously, you learned how the MAC and IP address of" class="rc-Phrase css-ugczj4" data-cue="32" data-cue-index="31" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">Previously, you learned how the MAC and IP address of </span></div><div aria-label="toggle video from the destination device is contained" class="rc-Phrase css-ugczj4" data-cue="33" data-cue-index="32" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">the destination device is contained </span></div><div aria-label="toggle video from in the header and footer of a data packet." class="rc-Phrase css-ugczj4" data-cue="34" data-cue-index="33" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">in the header and footer of a data packet. </span></div><div aria-label="toggle video from This is a security threat because it shows" class="rc-Phrase css-ugczj4" data-cue="35" data-cue-index="34" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">This is a security threat because it shows </span></div><div aria-label="toggle video from the IP and virtual location of your private network." class="rc-Phrase css-ugczj4" data-cue="36" data-cue-index="35" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">the IP and virtual location of your private network. </span></div><div aria-label="toggle video from You could secure a data packet by encrypting" class="rc-Phrase css-ugczj4" data-cue="37" data-cue-index="36" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">You could secure a data packet by encrypting </span></div><div aria-label="toggle video from it to make sure your information can't be deciphered," class="rc-Phrase css-ugczj4" data-cue="38" data-cue-index="37" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">it to make sure your information can't be deciphered, </span></div><div aria-label="toggle video from but then network routers won't be able to read" class="rc-Phrase css-ugczj4" data-cue="39" data-cue-index="38" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">but then network routers won't be able to read </span></div><div aria-label="toggle video from the IP and MAC address to know where to send it to." class="rc-Phrase css-ugczj4" data-cue="40" data-cue-index="39" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">the IP and MAC address to know where to send it to. </span></div><div aria-label="toggle video from This means you won't be able to connect to" class="rc-Phrase css-ugczj4" data-cue="41" data-cue-index="40" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">This means you won't be able to connect to </span></div><div aria-label="toggle video from the internet site or the service that you want." class="rc-Phrase css-ugczj4" data-cue="42" data-cue-index="41" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">the internet site or the service that you want. </span></div><div aria-label="toggle video from Encapsulation solves this problem" class="rc-Phrase css-ugczj4" data-cue="43" data-cue-index="42" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">Encapsulation solves this problem </span></div><div aria-label="toggle video from while still maintaining your privacy." class="rc-Phrase css-ugczj4" data-cue="44" data-cue-index="43" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">while still maintaining your privacy. </span></div><div aria-label="toggle video from VPN services encrypt your data packets and" class="rc-Phrase css-ugczj4" data-cue="45" data-cue-index="44" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">VPN services encrypt your data packets and </span></div><div aria-label="toggle video from encapsulate them in other data packets" class="rc-Phrase css-ugczj4" data-cue="46" data-cue-index="45" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">encapsulate them in other data packets </span></div><div aria-label="toggle video from that the routers can read." class="rc-Phrase css-ugczj4" data-cue="47" data-cue-index="46" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">that the routers can read. </span></div><div aria-label="toggle video from This allows your network requests" class="rc-Phrase css-ugczj4" data-cue="48" data-cue-index="47" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">This allows your network requests </span></div><div aria-label="toggle video from to reach their destination," class="rc-Phrase css-ugczj4" data-cue="49" data-cue-index="48" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">to reach their destination, </span></div><div aria-label="toggle video from but still encrypts your personal data" class="rc-Phrase css-ugczj4" data-cue="50" data-cue-index="49" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">but still encrypts your personal data </span></div><div aria-label="toggle video from so it's unreadable while in transit." class="rc-Phrase css-ugczj4" data-cue="51" data-cue-index="50" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">so it's unreadable while in transit. </span></div><div aria-label="toggle video from A VPN also uses an encrypted tunnel" class="rc-Phrase css-ugczj4" data-cue="52" data-cue-index="51" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">A VPN also uses an encrypted tunnel </span></div><div aria-label="toggle video from between your device and the VPN server." class="rc-Phrase css-ugczj4" data-cue="53" data-cue-index="52" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">between your device and the VPN server. </span></div><div aria-label="toggle video from The encryption is unhackable without a cryptographic key," class="rc-Phrase css-ugczj4" data-cue="54" data-cue-index="53" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">The encryption is unhackable without a cryptographic key, </span></div><div aria-label="toggle video from so no one can access your data." class="rc-Phrase css-ugczj4" data-cue="55" data-cue-index="54" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">so no one can access your data. </span></div></div></div></div><div class="cds-1 css-xl5mb3 cds-2" id="bkmrk--1"><div class="cds-1 rc-Paragraph css-1lz62pp cds-3 cds-grid-item">  
</div></div><div class="phrases" id="bkmrk-vpn-services-are-sim"><div aria-label="toggle video from VPN services are simple and offer" class="rc-Phrase css-ugczj4" data-cue="56" data-cue-index="55" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">VPN services are simple and offer </span></div><div aria-label="toggle video from significant protection while you're on the internet." class="rc-Phrase css-ugczj4" data-cue="57" data-cue-index="56" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">significant protection while you're on the internet. </span></div><div aria-label="toggle video from With a VPN," class="rc-Phrase css-ugczj4" data-cue="58" data-cue-index="57" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">With a VPN, </span></div><div aria-label="toggle video from you have the added assurance that your data is encrypted, and" class="rc-Phrase css-ugczj4" data-cue="59" data-cue-index="58" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">you have the added assurance that your data is encrypted, and </span></div><div aria-label="toggle video from your IP address and" class="rc-Phrase css-ugczj4" data-cue="60" data-cue-index="59" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">your IP address and </span></div><div aria-label="toggle video from current lecture segment: virtual location are unreadable to malicious actors." class="rc-Phrase active css-ugczj4" data-cue="61" data-cue-index="60" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">virtual location are unreadable to malicious actors. </span></div></div>

# Security zones

<div class="cds-1 css-xl5mb3 cds-2" id="bkmrk-in-this-section%2C-we%27"><div class="cds-1 rc-Paragraph css-1lz62pp cds-3 cds-grid-item"><div class="phrases"><div aria-label="toggle video from In this section, we'll discuss a type of" class="rc-Phrase css-ugczj4" data-cue="1" data-cue-index="0" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">In this section, we'll discuss a type of </span></div><div aria-label="toggle video from network security feature called a security zone." class="rc-Phrase css-ugczj4" data-cue="2" data-cue-index="1" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">network security feature called a security zone. </span></div><div aria-label="toggle video from Security zones are a segment of a network" class="rc-Phrase css-ugczj4" data-cue="3" data-cue-index="2" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">Security zones are a segment of a network </span></div><div aria-label="toggle video from that protects the internal network from the internet." class="rc-Phrase css-ugczj4" data-cue="4" data-cue-index="3" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">that protects the internal network from the internet. </span></div><div aria-label="toggle video from They are a part of a security technique" class="rc-Phrase css-ugczj4" data-cue="5" data-cue-index="4" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">They are a part of a security technique </span></div><div aria-label="toggle video from called network segmentation" class="rc-Phrase css-ugczj4" data-cue="6" data-cue-index="5" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">called network segmentation </span></div><div aria-label="toggle video from that divides the network into segments." class="rc-Phrase css-ugczj4" data-cue="7" data-cue-index="6" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">that divides the network into segments. </span></div><div aria-label="toggle video from Each network segment has" class="rc-Phrase css-ugczj4" data-cue="8" data-cue-index="7" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">Each network segment has </span></div><div aria-label="toggle video from its own access permissions and security rules." class="rc-Phrase css-ugczj4" data-cue="9" data-cue-index="8" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">its own access permissions and security rules. </span></div><div aria-label="toggle video from Security zones control who can" class="rc-Phrase css-ugczj4" data-cue="10" data-cue-index="9" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">Security zones control who can </span></div><div aria-label="toggle video from access different segments of a network." class="rc-Phrase css-ugczj4" data-cue="11" data-cue-index="10" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">access different segments of a network. </span></div><div aria-label="toggle video from Security zones act as a barrier to internal networks," class="rc-Phrase css-ugczj4" data-cue="12" data-cue-index="11" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">Security zones act as a barrier to internal networks, </span></div><div aria-label="toggle video from maintain privacy within corporate groups," class="rc-Phrase css-ugczj4" data-cue="13" data-cue-index="12" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">maintain privacy within corporate groups, </span></div><div aria-label="toggle video from and prevent issues from spreading to the whole network." class="rc-Phrase css-ugczj4" data-cue="14" data-cue-index="13" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">and prevent issues from spreading to the whole network. </span></div><div aria-label="toggle video from One example of network segmentation is" class="rc-Phrase css-ugczj4" data-cue="15" data-cue-index="14" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">One example of network segmentation is </span></div><div aria-label="toggle video from current lecture segment: a hotel that offers free public Wi-Fi." class="rc-Phrase active css-ugczj4" data-cue="16" data-cue-index="15" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">a hotel that offers free public Wi-Fi. </span></div><div aria-label="toggle video from The unsecured guest network is kept separate from" class="rc-Phrase css-ugczj4" data-cue="17" data-cue-index="16" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">The unsecured guest network is kept separate from </span></div><div aria-label="toggle video from another encrypted network used by the hotel staff." class="rc-Phrase css-ugczj4" data-cue="18" data-cue-index="17" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">another encrypted network used by the hotel staff. </span></div></div></div></div><div class="cds-1 css-xl5mb3 cds-2" id="bkmrk-"><div class="cds-1 rc-Paragraph css-1lz62pp cds-3 cds-grid-item">  
</div></div><div class="cds-1 css-xl5mb3 cds-2" id="bkmrk-additionally%2C-an-org"><div class="cds-1 rc-Paragraph css-1lz62pp cds-3 cds-grid-item"><div class="phrases"><div aria-label="toggle video from Additionally, an organization's" class="rc-Phrase css-ugczj4" data-cue="19" data-cue-index="18" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">Additionally, an organization's </span></div><div aria-label="toggle video from network can be divided into" class="rc-Phrase css-ugczj4" data-cue="20" data-cue-index="19" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">network can be divided into </span></div><div aria-label="toggle video from subnetworks, or subnets, to" class="rc-Phrase css-ugczj4" data-cue="21" data-cue-index="20" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">subnetworks, or subnets, to </span></div><div aria-label="toggle video from maintain privacy for each department in a organization." class="rc-Phrase css-ugczj4" data-cue="22" data-cue-index="21" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">maintain privacy for each department in a organization. </span></div><div aria-label="toggle video from For instance, at a university," class="rc-Phrase css-ugczj4" data-cue="23" data-cue-index="22" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">For instance, at a university, </span></div><div aria-label="toggle video from there may be a faculty subnet" class="rc-Phrase css-ugczj4" data-cue="24" data-cue-index="23" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">there may be a faculty subnet </span></div><div aria-label="toggle video from and a separate students subnet." class="rc-Phrase css-ugczj4" data-cue="25" data-cue-index="24" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">and a separate students subnet. </span></div><div aria-label="toggle video from If there is contamination on the student's subnet," class="rc-Phrase css-ugczj4" data-cue="26" data-cue-index="25" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">If there is contamination on the student's subnet, </span></div><div aria-label="toggle video from network administrators can isolate it and" class="rc-Phrase css-ugczj4" data-cue="27" data-cue-index="26" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">network administrators can isolate it and </span></div><div aria-label="toggle video from keep the rest of the network free from contamination." class="rc-Phrase css-ugczj4" data-cue="28" data-cue-index="27" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">keep the rest of the network free from contamination. </span></div></div></div></div><div class="cds-1 css-xl5mb3 cds-2" id="bkmrk--1"><div class="cds-1 rc-Paragraph css-1lz62pp cds-3 cds-grid-item">  
</div></div><div class="cds-1 css-xl5mb3 cds-2" id="bkmrk-an-organization%27s-ne"><div class="cds-1 rc-Paragraph css-1lz62pp cds-3 cds-grid-item"><div class="phrases"><div aria-label="toggle video from An organization's network is classified into" class="rc-Phrase css-ugczj4" data-cue="29" data-cue-index="28" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">An organization's network is classified into </span></div><div aria-label="toggle video from two types of security zones. First," class="rc-Phrase css-ugczj4" data-cue="30" data-cue-index="29" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">two types of security zones. First, </span></div><div aria-label="toggle video from there's the uncontrolled zone," class="rc-Phrase css-ugczj4" data-cue="31" data-cue-index="30" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">there's the uncontrolled zone, </span></div><div aria-label="toggle video from which is any network outside of" class="rc-Phrase css-ugczj4" data-cue="32" data-cue-index="31" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">which is any network outside of </span></div><div aria-label="toggle video from the organization's control, like the internet." class="rc-Phrase css-ugczj4" data-cue="33" data-cue-index="32" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">the organization's control, like the internet. </span></div><div aria-label="toggle video from Then, there's the controlled zone," class="rc-Phrase css-ugczj4" data-cue="34" data-cue-index="33" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">Then, there's the controlled zone, </span></div><div aria-label="toggle video from which is a subnet that protects" class="rc-Phrase css-ugczj4" data-cue="35" data-cue-index="34" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">which is a subnet that protects </span></div><div aria-label="toggle video from the internal network from the uncontrolled zone." class="rc-Phrase css-ugczj4" data-cue="36" data-cue-index="35" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">the internal network from the uncontrolled zone. </span></div><div aria-label="toggle video from There are several types of" class="rc-Phrase css-ugczj4" data-cue="37" data-cue-index="36" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">There are several types of </span></div><div aria-label="toggle video from networks within the controlled zone." class="rc-Phrase css-ugczj4" data-cue="38" data-cue-index="37" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">networks within the controlled zone. </span></div><div aria-label="toggle video from On the outer layer is the demilitarized zone," class="rc-Phrase css-ugczj4" data-cue="39" data-cue-index="38" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">On the outer layer is the demilitarized zone, </span></div><div aria-label="toggle video from or DMZ, which contains" class="rc-Phrase css-ugczj4" data-cue="40" data-cue-index="39" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">or DMZ, which contains </span></div><div aria-label="toggle video from public-facing services that can access the internet." class="rc-Phrase css-ugczj4" data-cue="41" data-cue-index="40" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">public-facing services that can access the internet. </span></div><div aria-label="toggle video from This includes web servers," class="rc-Phrase css-ugczj4" data-cue="42" data-cue-index="41" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">This includes web servers, </span></div><div aria-label="toggle video from proxy servers that host websites for the public," class="rc-Phrase css-ugczj4" data-cue="43" data-cue-index="42" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">proxy servers that host websites for the public, </span></div><div aria-label="toggle video from and DNS servers that provide" class="rc-Phrase css-ugczj4" data-cue="44" data-cue-index="43" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">and DNS servers that provide </span></div><div aria-label="toggle video from IP addresses for internet users." class="rc-Phrase css-ugczj4" data-cue="45" data-cue-index="44" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">IP addresses for internet users. </span></div><div aria-label="toggle video from It also includes email and file" class="rc-Phrase css-ugczj4" data-cue="46" data-cue-index="45" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">It also includes email and file </span></div><div aria-label="toggle video from servers that handle external communications." class="rc-Phrase css-ugczj4" data-cue="47" data-cue-index="46" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">servers that handle external communications. </span></div><div aria-label="toggle video from The DMZ acts as" class="rc-Phrase css-ugczj4" data-cue="48" data-cue-index="47" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">The DMZ acts as </span></div><div aria-label="toggle video from a network perimeter to the internal network." class="rc-Phrase css-ugczj4" data-cue="49" data-cue-index="48" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">a network perimeter to the internal network. </span></div><div aria-label="toggle video from The internal network contains private servers and" class="rc-Phrase css-ugczj4" data-cue="50" data-cue-index="49" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">The internal network contains private servers and </span></div><div aria-label="toggle video from data that the organization needs to protect." class="rc-Phrase css-ugczj4" data-cue="51" data-cue-index="50" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">data that the organization needs to protect. </span></div><div aria-label="toggle video from Inside the internal network is" class="rc-Phrase css-ugczj4" data-cue="52" data-cue-index="51" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">Inside the internal network is </span></div><div aria-label="toggle video from another zone called the restricted zone." class="rc-Phrase css-ugczj4" data-cue="53" data-cue-index="52" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">another zone called the restricted zone. </span></div><div aria-label="toggle video from The restricted zone protects" class="rc-Phrase css-ugczj4" data-cue="54" data-cue-index="53" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">The restricted zone protects </span></div><div aria-label="toggle video from highly confidential information that is only" class="rc-Phrase css-ugczj4" data-cue="55" data-cue-index="54" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">highly confidential information that is only </span></div><div aria-label="toggle video from accessible to employees with certain privileges." class="rc-Phrase css-ugczj4" data-cue="56" data-cue-index="55" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">accessible to employees with certain privileges. </span></div></div></div></div><div class="cds-1 css-xl5mb3 cds-2" id="bkmrk--2"><div class="cds-1 rc-Paragraph css-1lz62pp cds-3 cds-grid-item">  
</div></div><div class="cds-1 css-xl5mb3 cds-2" id="bkmrk-now%2C-let%27s-try-to-pi"><div class="cds-1 rc-Paragraph css-1lz62pp cds-3 cds-grid-item"><div class="phrases"><div aria-label="toggle video from Now, let's try to picture these security zones." class="rc-Phrase css-ugczj4" data-cue="57" data-cue-index="56" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">Now, let's try to picture these security zones. </span></div><div aria-label="toggle video from Ideally, the DMZ is situated between" class="rc-Phrase css-ugczj4" data-cue="58" data-cue-index="57" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">Ideally, the DMZ is situated between </span></div><div aria-label="toggle video from two firewalls. One of them" class="rc-Phrase css-ugczj4" data-cue="59" data-cue-index="58" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">two firewalls. One of them </span></div><div aria-label="toggle video from filters traffic outside the DMZ," class="rc-Phrase css-ugczj4" data-cue="60" data-cue-index="59" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">filters traffic outside the DMZ, </span></div><div aria-label="toggle video from and one of them filters traffic" class="rc-Phrase css-ugczj4" data-cue="61" data-cue-index="60" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">and one of them filters traffic </span></div><div aria-label="toggle video from entering the internal network." class="rc-Phrase css-ugczj4" data-cue="62" data-cue-index="61" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">entering the internal network. </span></div><div aria-label="toggle video from This protects the internal network" class="rc-Phrase css-ugczj4" data-cue="63" data-cue-index="62" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">This protects the internal network </span></div><div aria-label="toggle video from with several lines of defense." class="rc-Phrase css-ugczj4" data-cue="64" data-cue-index="63" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">with several lines of defense. </span></div><div aria-label="toggle video from If there's a restricted zone," class="rc-Phrase css-ugczj4" data-cue="65" data-cue-index="64" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">If there's a restricted zone, </span></div><div aria-label="toggle video from that too would be protected with" class="rc-Phrase css-ugczj4" data-cue="66" data-cue-index="65" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">that too would be protected with </span></div><div aria-label="toggle video from another firewall. This way," class="rc-Phrase css-ugczj4" data-cue="67" data-cue-index="66" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">another firewall. This way, </span></div><div aria-label="toggle video from attacks that penetrate into" class="rc-Phrase css-ugczj4" data-cue="68" data-cue-index="67" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">attacks that penetrate into </span></div><div aria-label="toggle video from the DMZ network cannot spread to the internal network," class="rc-Phrase css-ugczj4" data-cue="69" data-cue-index="68" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">the DMZ network cannot spread to the internal network, </span></div><div aria-label="toggle video from and attacks that penetrate" class="rc-Phrase css-ugczj4" data-cue="70" data-cue-index="69" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">and attacks that penetrate </span></div><div aria-label="toggle video from the internal network cannot access the restricted zone." class="rc-Phrase css-ugczj4" data-cue="71" data-cue-index="70" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">the internal network cannot access the restricted zone. </span></div><div aria-label="toggle video from As a security analyst," class="rc-Phrase css-ugczj4" data-cue="72" data-cue-index="71" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">As a security analyst, </span></div><div aria-label="toggle video from you may be responsible for regulating" class="rc-Phrase css-ugczj4" data-cue="73" data-cue-index="72" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">you may be responsible for regulating </span></div><div aria-label="toggle video from access control policies on these firewalls." class="rc-Phrase css-ugczj4" data-cue="74" data-cue-index="73" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">access control policies on these firewalls. </span></div><div aria-label="toggle video from Security teams can control traffic reaching" class="rc-Phrase css-ugczj4" data-cue="75" data-cue-index="74" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">Security teams can control traffic reaching </span></div><div aria-label="toggle video from the DMZ and the internal network" class="rc-Phrase css-ugczj4" data-cue="76" data-cue-index="75" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">the DMZ and the internal network </span></div><div aria-label="toggle video from by restricting IPs and ports." class="rc-Phrase css-ugczj4" data-cue="77" data-cue-index="76" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">by restricting IPs and ports. </span></div><div aria-label="toggle video from For example, an analyst may ensure that" class="rc-Phrase css-ugczj4" data-cue="78" data-cue-index="77" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">For example, an analyst may ensure that </span></div><div aria-label="toggle video from only HTTPS traffic is" class="rc-Phrase css-ugczj4" data-cue="79" data-cue-index="78" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">only HTTPS traffic is </span></div><div aria-label="toggle video from allowed to access web servers in the DMZ." class="rc-Phrase css-ugczj4" data-cue="80" data-cue-index="79" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">allowed to access web servers in the DMZ. </span></div></div></div></div><div class="cds-1 css-xl5mb3 cds-2" id="bkmrk--3"><div class="cds-1 rc-Paragraph css-1lz62pp cds-3 cds-grid-item">  
</div></div><div class="phrases" id="bkmrk-security-zones-are-a"><div aria-label="toggle video from Security zones are" class="rc-Phrase css-ugczj4" data-cue="81" data-cue-index="80" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">Security zones are </span></div><div aria-label="toggle video from an important part of securing networks," class="rc-Phrase css-ugczj4" data-cue="82" data-cue-index="81" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">an important part of securing networks, </span></div><div aria-label="toggle video from especially in large organizations." class="rc-Phrase css-ugczj4" data-cue="83" data-cue-index="82" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">especially in large organizations. </span></div><div aria-label="toggle video from Understanding how they are used is" class="rc-Phrase css-ugczj4" data-cue="84" data-cue-index="83" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">Understanding how they are used is </span></div><div aria-label="toggle video from essential for all security analysts." class="rc-Phrase css-ugczj4" data-cue="85" data-cue-index="84" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">essential for all security analysts. </span></div><div aria-label="toggle video from Coming up, we'll learn about securing internal networks." class="rc-Phrase css-ugczj4" data-cue="86" data-cue-index="85" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">Coming up, we'll learn about securing internal networks. </span></div></div>

# Subnetting and CIDR

Earlier in this course, you learned about network segmentation, a security technique that divides networks into sections. A private network can be segmented to protect portions of the network from the internet, which is an unsecured global network.

For example, you learned about the uncontrolled zone, the controlled zone, the demilitarized zone, and the restricted zone. Feel free to review the video about [security zones<svg aria-labelledby="cds-react-aria-661-title" class="css-1lzqdox" fill="none" focusable="false" height="16" id="bkmrk-" role="img" viewbox="0 0 16 16" width="16"></svg>](https://www.coursera.org/learn/networks-and-network-security/lecture/GccYm/security-zones)

for a refresher on how network segmentation can be used to add a layer of security to your organization’s network operations. Creating security zones is one example of a networking strategy called subnetting.

## Overview of subnetting

**Subnetting** is the subdivision of a network into logical groups called subnets. It works like a network inside a network. Subnetting divides up a network address range into smaller subnets within the network. These smaller subnets form based on the IP addresses and network mask of the devices on the network. Subnetting creates a network of devices to function as their own network. This makes the network more efficient and can also be used to create security zones. If devices on the same subnet communicate with each other, the switch changes the transmissions to stay on the same subnet, improving speed and efficiency of the communications.

<div id="bkmrk--1"><figure contenteditable="false" role="figure">![Two subnets for two networks connected to one router.](https://d3c33hcgiwev3.cloudfront.net/imageAssetProxy.v1/vzbgwk8-RoCJ8Ppet89raA_1a225a330b8b4eaeb4a2b8bc5baaaef1_qvNCswL7ECbUiKTyL6rjp35BTSD-bbfoAoajmAyy4hHvmBJwwr22RU8T5aGDunmwKb1kvZ5TneMbG-nngVlkPXF6W-BTMap_a6XP-kAy5jgW13XvT5OTSCmI7U9YVNX4JzC1qn-zCkiZSXhbKjm2zq7SESzmANYH17_p4jub1mNikwElbJZECK0VuM_4Yrwljgfgdx2VpNad7gx2lFHMiu01wfeRKp-sjRa_kQ?expiry=1688169600000&hmac=P7eoUC0lmccZnEt0ygyr_SqgSwYImp3-f7vPw-87vyg)</figure></div>## Classless Inter-Domain Routing notation for subnetting

Classless Inter-Domain Routing (CIDR) is a method of assigning subnet masks to IP addresses to create a subnet. Classless addressing replaces classful addressing. Classful addressing was used in the 1980s as a system of grouping IP addresses into classes (Class A to Class E). Each class included a limited number of IP addresses, which were depleted as the number of devices connecting to the internet outgrew the classful range in the 1990s. Classless CIDR addressing expanded the number of available IPv4 addresses.

CIDR allows cybersecurity professionals to segment classful networks into smaller chunks. CIDR IP addresses are formatted like IPv4 addresses, but they include a slash (“/’”) followed by a number at the end of the address, This extra number is called the IP network prefix. For example, a regular IPv4 address uses the 198.51.100.0 format, whereas a CIDR IP address would include the IP network prefix at the end of the address, 198.51.100.0/24. This CIDR address encompasses all IP addresses between 198.51.100.0 and 198.51.100.255. The system of CIDR addressing reduces the number of entries in routing tables and provides more available IP addresses within networks. You can try converting CIDR to IPv4 addresses and vice versa through an online conversion tool, like [IPAddressGuide<svg aria-labelledby="cds-react-aria-662-title" class="css-1lzqdox" fill="none" focusable="false" height="16" id="bkmrk--2" role="img" viewbox="0 0 16 16" width="16"></svg>](https://www.ipaddressguide.com/cidr)

, for practice and to better understand this concept.

**Note:** You may learn more about CIDR during your career, but it won't be covered in any additional depth in this certificate program. For now, you only need a basic understanding of this concept.

## Security benefits of subnetting

Subnetting allows network professionals and analysts to create a network within their own network without requesting another network IP address from their internet service provider. This process uses network bandwidth more efficiently and improves network performance. Subnetting is one component of creating isolated subnetworks through physical isolation, routing configuration, and firewalls.

## Key takeaways

Subnetting is a common security strategy used by organizations. Subnetting allows organizations to create smaller networks within their private network. This improves the efficiency of the network and can be used to create security zones.

# Proxy servers

<div class="cds-1 css-xl5mb3 cds-2" id="bkmrk-previously%2C-we-discu"><div class="cds-1 rc-Paragraph css-1lz62pp cds-3 cds-grid-item"><div class="phrases"><div aria-label="toggle video from Previously, we discussed how firewalls, VPNs, and" class="rc-Phrase css-ugczj4" data-cue="1" data-cue-index="0" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">Previously, we discussed how firewalls, VPNs, and </span></div><div aria-label="toggle video from security zones help to secure networks." class="rc-Phrase css-ugczj4" data-cue="2" data-cue-index="1" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">security zones help to secure networks. </span></div><div aria-label="toggle video from current lecture segment: Next, we'll cover how to secure internal networks with proxy servers." class="rc-Phrase active css-ugczj4" data-cue="3" data-cue-index="2" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">Next, we'll cover how to secure internal networks with proxy servers. </span></div></div></div></div><div class="cds-1 css-xl5mb3 cds-2" id="bkmrk-"><div class="cds-1 rc-Paragraph css-1lz62pp cds-3 cds-grid-item">  
</div></div><div class="cds-1 css-xl5mb3 cds-2" id="bkmrk-proxy-servers-are-an"><div class="cds-1 rc-Paragraph css-1lz62pp cds-3 cds-grid-item"><div class="phrases"><div aria-label="toggle video from Proxy servers are another system that helps secure networks." class="rc-Phrase css-ugczj4" data-cue="4" data-cue-index="3" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">Proxy servers are another system that helps secure networks. </span></div><div aria-label="toggle video from The definition of a proxy server is a server that fulfills the request of" class="rc-Phrase css-ugczj4" data-cue="5" data-cue-index="4" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">The definition of a proxy server is a server that fulfills the request of </span></div><div aria-label="toggle video from a client by forwarding them on to other servers." class="rc-Phrase css-ugczj4" data-cue="6" data-cue-index="5" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">a client by forwarding them on to other servers. </span></div><div aria-label="toggle video from The proxy server is a dedicated server that sits between the internet and" class="rc-Phrase css-ugczj4" data-cue="7" data-cue-index="6" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">The proxy server is a dedicated server that sits between the internet and </span></div><div aria-label="toggle video from the rest of the network." class="rc-Phrase css-ugczj4" data-cue="8" data-cue-index="7" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">the rest of the network. </span></div><div aria-label="toggle video from When a request to connect to the network comes in from the internet," class="rc-Phrase css-ugczj4" data-cue="9" data-cue-index="8" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">When a request to connect to the network comes in from the internet, </span></div><div aria-label="toggle video from the proxy server will determine if the connection request is safe." class="rc-Phrase css-ugczj4" data-cue="10" data-cue-index="9" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">the proxy server will determine if the connection request is safe. </span></div><div aria-label="toggle video from The proxy server is a public IP address that is different from the rest" class="rc-Phrase css-ugczj4" data-cue="11" data-cue-index="10" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">The proxy server is a public IP address that is different from the rest </span></div><div aria-label="toggle video from of the private network." class="rc-Phrase css-ugczj4" data-cue="12" data-cue-index="11" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">of the private network. </span></div><div aria-label="toggle video from This hides the private network's IP address from malicious actors on the internet and" class="rc-Phrase css-ugczj4" data-cue="13" data-cue-index="12" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">This hides the private network's IP address from malicious actors on the internet and </span></div><div aria-label="toggle video from adds a layer of security." class="rc-Phrase css-ugczj4" data-cue="14" data-cue-index="13" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">adds a layer of security. </span></div></div></div></div><div class="cds-1 css-xl5mb3 cds-2" id="bkmrk--1"><div class="cds-1 rc-Paragraph css-1lz62pp cds-3 cds-grid-item">  
</div></div><div class="cds-1 css-xl5mb3 cds-2" id="bkmrk-let%27s-examine-how-th"><div class="cds-1 rc-Paragraph css-1lz62pp cds-3 cds-grid-item"><div class="phrases"><div aria-label="toggle video from Let's examine how this will work with an example." class="rc-Phrase css-ugczj4" data-cue="15" data-cue-index="14" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">Let's examine how this will work with an example. </span></div><div aria-label="toggle video from When a client receives an HTTPS response, they will notice a distorted IP address or" class="rc-Phrase css-ugczj4" data-cue="16" data-cue-index="15" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">When a client receives an HTTPS response, they will notice a distorted IP address or </span></div><div aria-label="toggle video from no IP address rather than the real IP address of the organization's web server." class="rc-Phrase css-ugczj4" data-cue="17" data-cue-index="16" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">no IP address rather than the real IP address of the organization's web server. </span></div><div aria-label="toggle video from A proxy server can also be used to block unsafe websites that users aren't allowed" class="rc-Phrase css-ugczj4" data-cue="18" data-cue-index="17" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">A proxy server can also be used to block unsafe websites that users aren't allowed </span></div><div aria-label="toggle video from to access on an organization's network." class="rc-Phrase css-ugczj4" data-cue="19" data-cue-index="18" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">to access on an organization's network. </span></div><div aria-label="toggle video from A proxy server uses temporary memory to store data that's" class="rc-Phrase css-ugczj4" data-cue="20" data-cue-index="19" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">A proxy server uses temporary memory to store data that's </span></div><div aria-label="toggle video from regularly requested by external servers." class="rc-Phrase css-ugczj4" data-cue="21" data-cue-index="20" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">regularly requested by external servers. </span></div><div aria-label="toggle video from This way, it doesn't have to fetch data from an organization's internal" class="rc-Phrase css-ugczj4" data-cue="22" data-cue-index="21" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">This way, it doesn't have to fetch data from an organization's internal </span></div><div aria-label="toggle video from servers every time." class="rc-Phrase css-ugczj4" data-cue="23" data-cue-index="22" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">servers every time. </span></div><div aria-label="toggle video from This enhances security by reducing contact with the internal server." class="rc-Phrase css-ugczj4" data-cue="24" data-cue-index="23" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">This enhances security by reducing contact with the internal server. </span></div></div></div></div><div class="cds-1 css-xl5mb3 cds-2" id="bkmrk--2"><div class="cds-1 rc-Paragraph css-1lz62pp cds-3 cds-grid-item">  
</div></div><div class="cds-1 css-xl5mb3 cds-2" id="bkmrk-there-are-different-"><div class="cds-1 rc-Paragraph css-1lz62pp cds-3 cds-grid-item"><div class="phrases"><div aria-label="toggle video from There are different types of proxy servers that support network security." class="rc-Phrase css-ugczj4" data-cue="25" data-cue-index="24" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">There are different types of proxy servers that support network security. </span></div><div aria-label="toggle video from This is important for security analysts who monitor" class="rc-Phrase css-ugczj4" data-cue="26" data-cue-index="25" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">This is important for security analysts who monitor </span></div><div aria-label="toggle video from traffic from various proxy servers and may need to know what purpose they serve." class="rc-Phrase css-ugczj4" data-cue="27" data-cue-index="26" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">traffic from various proxy servers and may need to know what purpose they serve. </span></div><div aria-label="toggle video from Let's explore some different types of proxy servers." class="rc-Phrase css-ugczj4" data-cue="28" data-cue-index="27" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">Let's explore some different types of proxy servers. </span></div><div aria-label="toggle video from A forward proxy server regulates and" class="rc-Phrase css-ugczj4" data-cue="29" data-cue-index="28" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">A forward proxy server regulates and </span></div><div aria-label="toggle video from restricts a person with access to the internet." class="rc-Phrase css-ugczj4" data-cue="30" data-cue-index="29" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">restricts a person with access to the internet. </span></div><div aria-label="toggle video from The goal is to hide a user's IP address and approve all outgoing requests." class="rc-Phrase css-ugczj4" data-cue="31" data-cue-index="30" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">The goal is to hide a user's IP address and approve all outgoing requests. </span></div><div aria-label="toggle video from In the context of an organization," class="rc-Phrase css-ugczj4" data-cue="32" data-cue-index="31" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">In the context of an organization, </span></div><div aria-label="toggle video from a forward proxy server receives outgoing traffic from an employee, approves it, and" class="rc-Phrase css-ugczj4" data-cue="33" data-cue-index="32" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">a forward proxy server receives outgoing traffic from an employee, approves it, and </span></div><div aria-label="toggle video from then forwards it on to the destination on the internet." class="rc-Phrase css-ugczj4" data-cue="34" data-cue-index="33" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">then forwards it on to the destination on the internet. </span></div><div aria-label="toggle video from A reverse proxy server regulates and" class="rc-Phrase css-ugczj4" data-cue="35" data-cue-index="34" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">A reverse proxy server regulates and </span></div><div aria-label="toggle video from restricts the internet access to an internal server." class="rc-Phrase css-ugczj4" data-cue="36" data-cue-index="35" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">restricts the internet access to an internal server. </span></div><div aria-label="toggle video from The goal is to accept traffic from external parties, approve it, and" class="rc-Phrase css-ugczj4" data-cue="37" data-cue-index="36" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">The goal is to accept traffic from external parties, approve it, and </span></div><div aria-label="toggle video from forward it to the internal servers." class="rc-Phrase css-ugczj4" data-cue="38" data-cue-index="37" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">forward it to the internal servers. </span></div><div aria-label="toggle video from This setup is useful for protecting internal web servers containing" class="rc-Phrase css-ugczj4" data-cue="39" data-cue-index="38" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">This setup is useful for protecting internal web servers containing </span></div><div aria-label="toggle video from confidential data from exposing their IP address to external parties." class="rc-Phrase css-ugczj4" data-cue="40" data-cue-index="39" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">confidential data from exposing their IP address to external parties. </span></div><div aria-label="toggle video from An email proxy server is another valuable security tool." class="rc-Phrase css-ugczj4" data-cue="41" data-cue-index="40" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">An email proxy server is another valuable security tool. </span></div><div aria-label="toggle video from It filters spam email by verifying whether a sender's address was forged." class="rc-Phrase css-ugczj4" data-cue="42" data-cue-index="41" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">It filters spam email by verifying whether a sender's address was forged. </span></div><div aria-label="toggle video from This reduces the risk of phishing attacks that impersonate people known to" class="rc-Phrase css-ugczj4" data-cue="43" data-cue-index="42" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">This reduces the risk of phishing attacks that impersonate people known to </span></div><div aria-label="toggle video from the organization." class="rc-Phrase css-ugczj4" data-cue="44" data-cue-index="43" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">the organization. </span></div></div></div></div><div class="cds-1 css-xl5mb3 cds-2" id="bkmrk--3"><div class="cds-1 rc-Paragraph css-1lz62pp cds-3 cds-grid-item">  
</div></div><div class="cds-1 css-xl5mb3 cds-2" id="bkmrk-let%27s-talk-about-a-r"><div class="cds-1 rc-Paragraph css-1lz62pp cds-3 cds-grid-item"><div class="phrases"><div aria-label="toggle video from Let's talk about a real world example of an email proxy." class="rc-Phrase css-ugczj4" data-cue="45" data-cue-index="44" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">Let's talk about a real world example of an email proxy. </span></div><div aria-label="toggle video from Several years ago when I was working at a large U.S. broadband ISP," class="rc-Phrase css-ugczj4" data-cue="46" data-cue-index="45" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">Several years ago when I was working at a large U.S. broadband ISP, </span></div><div aria-label="toggle video from we used a proxy server to implement multiple layers of anti-spam filtering" class="rc-Phrase css-ugczj4" data-cue="47" data-cue-index="46" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">we used a proxy server to implement multiple layers of anti-spam filtering </span></div><div aria-label="toggle video from before a message was allowed in for delivery." class="rc-Phrase css-ugczj4" data-cue="48" data-cue-index="47" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">before a message was allowed in for delivery. </span></div><div aria-label="toggle video from It ended up tagging around 95% of messages as spam." class="rc-Phrase css-ugczj4" data-cue="49" data-cue-index="48" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">It ended up tagging around 95% of messages as spam. </span></div><div aria-label="toggle video from The proxy servers would've allowed us to filter and" class="rc-Phrase css-ugczj4" data-cue="50" data-cue-index="49" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">The proxy servers would've allowed us to filter and </span></div><div aria-label="toggle video from then scale those filters without impacting the underlying email platform." class="rc-Phrase css-ugczj4" data-cue="51" data-cue-index="50" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">then scale those filters without impacting the underlying email platform. </span></div></div></div></div><div class="cds-1 css-xl5mb3 cds-2" id="bkmrk--4"><div class="cds-1 rc-Paragraph css-1lz62pp cds-3 cds-grid-item">  
</div></div><div class="phrases" id="bkmrk-proxy-servers-play-a"><div aria-label="toggle video from Proxy servers play an important part in network security by filtering incoming and" class="rc-Phrase css-ugczj4" data-cue="52" data-cue-index="51" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">Proxy servers play an important part in network security by filtering incoming and </span></div><div aria-label="toggle video from outgoing traffic and staying alert to network attacks." class="rc-Phrase css-ugczj4" data-cue="53" data-cue-index="52" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">outgoing traffic and staying alert to network attacks. </span></div><div aria-label="toggle video from These devices add a layer of protection from the unsecured public network that we call" class="rc-Phrase css-ugczj4" data-cue="54" data-cue-index="53" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">These devices add a layer of protection from the unsecured public network that we call </span></div><div aria-label="toggle video from the internet." class="rc-Phrase css-ugczj4" data-cue="55" data-cue-index="54" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">the internet. </span></div></div>

# Virtual networks and privacy

This section of the course covered a lot of information about network operations. You reviewed the fundamentals of network architecture and communication and can now use this knowledge as you learn how to secure networks. Securing a private network requires maintaining the confidentiality of your data and restricting access to authorized users.

In this reading, you will review several network security topics previously covered in the course, including virtual private networks (VPNs), virtual local area networks (VLANs), proxy servers, firewalls, tunneling, and security zones. You'll continue to learn more about these concepts and how they relate to each other as you continue through the course.

## **Common network protocols** 

Network protocols are used to direct traffic to the correct device and service depending on the kind of communication being performed by the devices on the network. Protocols are the rules used by all network devices that provide a mutually agreed upon foundation for how to transfer data across a network.

There are three main categories of network protocols: communication protocols, management protocols, and security protocols.

<div class="rc-CML" dir="auto" id="bkmrk-communication-protoc"><div class="rc-CML" dir="auto"><div><div data-track="true" data-track-action="click" data-track-app="open_course_home" data-track-component="cml" data-track-page="item_layout" role="presentation"><div data-track="true" data-track-action="click" data-track-app="open_course_home" data-track-component="cml_link" data-track-page="item_layout"><div class="css-1k5v0wb" data-testid="cml-viewer">1. Communication protocols are used to establish connections between servers. Examples include TCP, UDP, and Simple Mail Transfer Protocol (SMTP), which provides a framework for email communication.
2. Management protocols are used to troubleshoot network issues. One example is the Internet Control Message Protocol (ICMP).
3. Security protocols provide encryption for data in transit. Examples include IPSec and SSL/TLS.

</div></div></div></div></div></div>Some other commonly used protocols are:

<div class="rc-CML" dir="auto" id="bkmrk-hypertext-transfer-p"><div class="rc-CML" dir="auto"><div><div data-track="true" data-track-action="click" data-track-app="open_course_home" data-track-component="cml" data-track-page="item_layout" role="presentation"><div data-track="true" data-track-action="click" data-track-app="open_course_home" data-track-component="cml_link" data-track-page="item_layout"><div class="css-1k5v0wb" data-testid="cml-viewer">- HyperText Transfer Protocol (HTTP). HTTP is an application layer communication protocol. This allows the browser and the web server to communicate with one another.
- Domain Name System (DNS). DNS is an application layer protocol that translates, or maps, host names to IP addresses.
- Address Resolution Protocol (ARP). ARP is a network layer communication protocol that maps IP addresses to physical machines or a MAC address recognized on the local area network.

</div></div></div></div></div></div>## **Wi-Fi**

This section of the course also introduced various wireless security protocols, including WEP, WPA, WPA2, and WPA3. WPA3 encrypts traffic with the Advanced Encryption Standard (AES) cipher as it travels from your device to the wireless access point. WPA2 and WPA3 offer two modes: personal and enterprise. Personal mode is best suited for home networks while enterprise mode is generally utilized for business networks and applications.

## **Network security tools and practices** 

### **Firewalls** 

Previously, you learned that firewalls are network virtual appliances (NVAs) or hardware devices that inspect and can filter network traffic before it’s permitted to enter the private network. Traditional firewalls are configured with rules that tell it what types of data packets are allowed based on the port number and IP address of the data packet.

There are two main categories of firewalls.

<div class="rc-CML" dir="auto" id="bkmrk-stateless%3A-a-class-o"><div class="rc-CML" dir="auto"><div><div data-track="true" data-track-action="click" data-track-app="open_course_home" data-track-component="cml" data-track-page="item_layout" role="presentation"><div data-track="true" data-track-action="click" data-track-app="open_course_home" data-track-component="cml_link" data-track-page="item_layout"><div class="css-1k5v0wb" data-testid="cml-viewer">- **Stateless:** A class of firewall that operates based on predefined rules and does not keep track of information from data packets
- **Stateful:** A class of firewall that keeps track of information passing through it and proactively filters out threats. Unlike stateless firewalls, which require rules to be configured in two directions, a stateful firewall only requires a rule in one direction. This is because it uses a "state table" to track connections, so it can match return traffic to an existing session

</div></div></div></div></div></div>Next generation firewalls (NGFWs) are the most technologically advanced firewall protection. They exceed the security offered by stateful firewalls because they include deep packet inspection (a kind of packet sniffing that examines data packets and takes actions if threats exist) and intrusion prevention features that detect security threats and notify firewall administrators. NGFWs can inspect traffic at the application layer of the TCP/IP model and are typically application aware. Unlike traditional firewalls that block traffic based on IP address and ports, NGFWs rules can be configured to block or allow traffic based on the application. Some NGFWs have additional features like Malware Sandboxing, Network Anti-Virus, and URL and DNS Filtering.

### **Proxy servers** 

A proxy server is another way to add security to your private network. Proxy servers utilize network address translation (NAT) to serve as a barrier between clients on the network and external threats. Forward proxies handle queries from internal clients when they access resources external to the network. Reverse proxies function opposite of forward proxies; they handle requests from external systems to services on the internal network. Some proxy servers can also be configured with rules, like a firewall. For example, you can create filters to block websites identified as containing malware.

### **Virtual Private Networks (VPN)**

A VPN is a service that encrypts data in transit and disguises your IP address. VPNs use a process called encapsulation. Encapsulation wraps your encrypted data in an unencrypted data packet, which allows your data to be sent across the public network while remaining anonymous. Enterprises and other organizations use VPNs to help protect communications from users’ devices to corporate resources. Some of these resources include connecting to servers or virtual machines that host business applications. VPNs can also be used for personal use to increase personal privacy. They allow the user to access the internet without anyone being able to read their personal information or access their private IP address. Organizations are increasingly using a combination of VPN and SD-WAN capabilities to secure their networks. A software-defined wide area network (SD-WAN) is a virtual WAN service that allows organizations to securely connect users to applications across multiple locations and over large geographical distances.

### **Key takeaways**

There are three main categories of network protocols: communication, management, and security protocols. In this reading, you learned the fundamentals of firewalls, proxy servers, and VPNs. More organizations are implementing a cloud-based approach to network security by incorporating a combination of VPN and SD-WAN capabilities as a service.

# Glossary terms from week 2

# Glossary terms from week 2

## Terms and definitions from Course 3, Week 2

**Address Resolution Protocol (ARP):** A network protocol used to determine the MAC address of the next router or device on the path

**Cloud-based firewalls:** Software firewalls that are hosted by the cloud service provider

**Controlled zone:** A subnet that protects the internal network from the uncontrolled zone

**Domain Name System (DNS):** A networking protocol that translates internet domain names into IP addresses

**Encapsulation:** A process performed by a VPN service that protects your data by wrapping sensitive data in other data packets

**Firewall:** A network security device that monitors traffic to or from your network

**Forward proxy server:** A server that regulates and restricts a person’s access to the internet

**Hypertext Transfer Protocol (HTTP):** An application layer protocol that provides a method of communication between clients and website servers

**Hypertext Transfer Protocol Secure (HTTPS):** A network protocol that provides a secure method of communication between clients and servers

**IEEE 802.11 (Wi-Fi):** A set of standards that define communication for wireless LANs

**Network protocols:** A set of rules used by two or more devices on a network to describe the order of delivery of data and the structure of data

**Network segmentation:** A security technique that divides the network into segments

**Port filtering:** A firewall function that blocks or allows certain port numbers to limit unwanted communication

**Proxy server:** A server that fulfills the requests of its clients by forwarding them to other servers

**Reverse proxy server:** A server that regulates and restricts the internet's access to an internal server

**Secure File Transfer Protocol (SFTP):** A secure protocol used to transfer files from one device to another over a network

**Secure shell (SSH):** A security protocol used to create a shell with a remote system

**Security zone:** A segment of a company’s network that protects the internal network from the internet

**Simple Network Management Protocol (SNMP):** A network protocol used for monitoring and managing devices on a network

**Stateful:** A class of firewall that keeps track of information passing through it and proactively filters out threats

**Stateless:** A class of firewall that operates based on predefined rules and does not keep track of information from data packets

**Transmission Control Protocol (TCP):** An internet communication protocol that allows two devices to form a connection and stream data

**Uncontrolled zone:** The portion of the network outside the organization

**Virtual private network (VPN):** A network security service that changes your public IP address and masks your virtual location so that you can keep your data private when you are using a public network like the internet

**Wi-Fi Protected Access (WPA):** A wireless security protocol for devices to connect to the internet

# Course 3 resources and citations

#   


# Week 1: Network architecture

## Resources

[Helpful resources to get started<svg aria-labelledby="cds-react-aria-631-title" class="css-1lzqdox" fill="none" focusable="false" height="16" id="bkmrk--1" role="img" viewbox="0 0 16 16" width="16"></svg>](https://www.coursera.org/learn/automate-cybersecurity-tasks-with-python/supplement/u8Np0/helpful-resources-to-get-started)

- [Coursera Code of Conduct<svg aria-labelledby="cds-react-aria-632-title" class="css-1lzqdox" fill="none" focusable="false" height="16" id="bkmrk--2" role="img" viewbox="0 0 16 16" width="16"></svg>](https://www.coursera.support/s/article/208280036-Coursera-Code-of-Conduct?language=en_US)
- 
- [Coursera Honor Code<svg aria-labelledby="cds-react-aria-633-title" class="css-1lzqdox" fill="none" focusable="false" height="16" id="bkmrk--3" role="img" viewbox="0 0 16 16" width="16"></svg>](https://www.coursera.support/s/article/209818863-Coursera-Honor-Code?language=en_US)
- 
- [Coursera: Edit my profile<svg aria-labelledby="cds-react-aria-634-title" class="css-1lzqdox" fill="none" focusable="false" height="16" id="bkmrk--4" role="img" viewbox="0 0 16 16" width="16"></svg>](https://www.coursera.org/account-profile)
- 
- [Coursera: Learner Help Center<svg aria-labelledby="cds-react-aria-635-title" class="css-1lzqdox" fill="none" focusable="false" height="16" id="bkmrk--5" role="img" viewbox="0 0 16 16" width="16"></svg>](https://learner.coursera.help/hc/en-us)
- 
- [Coursera’s Global Online Community<svg aria-labelledby="cds-react-aria-636-title" class="css-1lzqdox" fill="none" focusable="false" height="16" id="bkmrk--6" role="img" viewbox="0 0 16 16" width="16"></svg>](https://www.coursera.support/s/community?language=en_US)
- 
- [Google: Common problems with labs<svg aria-labelledby="cds-react-aria-637-title" class="css-1lzqdox" fill="none" focusable="false" height="16" id="bkmrk--7" role="img" viewbox="0 0 16 16" width="16"></svg>](https://support.google.com/qwiklabs/answer/9133560?hl=en&ref_topic=9134804)
- 
- [Google Docs help<svg aria-labelledby="cds-react-aria-638-title" class="css-1lzqdox" fill="none" focusable="false" height="16" id="bkmrk--8" role="img" viewbox="0 0 16 16" width="16"></svg>](https://support.google.com/docs/topic/9046002?hl=en&ref_topic=1382883)
- 
- [Google Sheets help<svg aria-labelledby="cds-react-aria-639-title" class="css-1lzqdox" fill="none" focusable="false" height="16" id="bkmrk--9" role="img" viewbox="0 0 16 16" width="16"></svg>](https://support.google.com/docs/topic/9054603?hl=en&ref_topic=1382883)
- 
- [How to use Google Slides<svg aria-labelledby="cds-react-aria-640-title" class="css-1lzqdox" fill="none" focusable="false" height="16" id="bkmrk--10" role="img" viewbox="0 0 16 16" width="16"></svg>](https://support.google.com/docs/answer/2763168?hl=en&co=GENIE.Platform%3DDesktop)
- 
- [Microsoft Excel help and learning<svg aria-labelledby="cds-react-aria-641-title" class="css-1lzqdox" fill="none" focusable="false" height="16" id="bkmrk--11" role="img" viewbox="0 0 16 16" width="16"></svg>](https://support.microsoft.com/en-us/excel)
- 
- [PowerPoint help and learning<svg aria-labelledby="cds-react-aria-642-title" class="css-1lzqdox" fill="none" focusable="false" height="16" id="bkmrk--12" role="img" viewbox="0 0 16 16" width="16"></svg>](https://support.microsoft.com/en-us/powerpoint)
- 
- [Word help and learning<svg aria-labelledby="cds-react-aria-643-title" class="css-1lzqdox" fill="none" focusable="false" height="16" id="bkmrk--13" role="img" viewbox="0 0 16 16" width="16"></svg>](https://support.microsoft.com/en-us/word)

- 

## Citations

[Network components, devices, and diagrams<svg aria-labelledby="cds-react-aria-644-title" class="css-1lzqdox" fill="none" focusable="false" height="16" id="bkmrk--14" role="img" viewbox="0 0 16 16" width="16"></svg>](https://www.coursera.org/learn/networks-and-network-security/supplement/AdErf/network-components-devices-and-diagrams)

- Meyers, Mike, and Scott Jernigan. (2019) CompTIA A+ Certification All-in-One Exam Guide, (Exams 220-1001 &amp; 220-1002).
- Oluwatosin, H.S. (2014). Client-server model. *IOSR Journal of Computer Engineering*, *16*(1), 67-71.
- Sulyman, Shakirat. (2014). Client-Server Model. IOSR Journal of Computer Engineering. 16. 57-71. 10.9790/0661-16195771.
- GeeksforGeeks. (2022, March 21). [*Devices used in each layer of TCP/IP model*<svg aria-labelledby="cds-react-aria-645-title" class="css-1lzqdox" fill="none" focusable="false" height="16" id="bkmrk--15" role="img" viewbox="0 0 16 16" width="16"></svg>](https://www.geeksforgeeks.org/devices-used-in-each-layer-of-tcp-ip-model/)

*.*[ <svg aria-labelledby="cds-react-aria-646-title" class="css-1lzqdox" fill="none" focusable="false" height="16" id="bkmrk--16" role="img" viewbox="0 0 16 16" width="16"></svg>](https://www.geeksforgeeks.org/devices-used-in-each-layer-of-tcp-ip-model/)

- 

[Cloud computing and software-defined networks<svg aria-labelledby="cds-react-aria-647-title" class="css-1lzqdox" fill="none" focusable="false" height="16" id="bkmrk--17" role="img" viewbox="0 0 16 16" width="16"></svg>](https://www.coursera.org/learn/networks-and-network-security/supplement/kNUaM/cloud-computing-and-software-defined-networks)

- Rackspace Technology Colo Data Centers. (n.d.). [*What is colocation?*<svg aria-labelledby="cds-react-aria-648-title" class="css-1lzqdox" fill="none" focusable="false" height="16" id="bkmrk--18" role="img" viewbox="0 0 16 16" width="16"></svg>](https://www.rackspace.com/library/what-is-colocation)
- 
- Fortinet. (n.d.). [*What is hybrid cloud?*<svg aria-labelledby="cds-react-aria-649-title" class="css-1lzqdox" fill="none" focusable="false" height="16" id="bkmrk--19" role="img" viewbox="0 0 16 16" width="16"></svg>](https://www.fortinet.com/resources/cyberglossary/what-is-hybrid-cloud)

- 

[Learn more about the TCP/IP model<svg aria-labelledby="cds-react-aria-650-title" class="css-1lzqdox" fill="none" focusable="false" height="16" id="bkmrk--20" role="img" viewbox="0 0 16 16" width="16"></svg>](https://www.coursera.org/learn/networks-and-network-security/supplement/SXl0z/review-of-the-tcp-ip-model)

- Clarke, Glen E. (2018). CompTIA Network+ Certification Study Guide: Exam N10-007.
- International Business Machines. (2022, Nov 15). [*User datagram protocol*<svg aria-labelledby="cds-react-aria-651-title" class="css-1lzqdox" fill="none" focusable="false" height="16" id="bkmrk--21" role="img" viewbox="0 0 16 16" width="16"></svg>](https://www.ibm.com/docs/en/aix/7.2?topic=protocols-user-datagram-protocol)
- *.*
- International Business Machines. (2022, Nov 15). [*Transmission control protocol*<svg aria-labelledby="cds-react-aria-652-title" class="css-1lzqdox" fill="none" focusable="false" height="16" id="bkmrk--22" role="img" viewbox="0 0 16 16" width="16"></svg>](https://www.ibm.com/docs/en/aix/7.2?topic=protocols-transmission-control-protocol)
- *.*
- Oracle. (n.d.). [*TCP/IP protocol architecture model*<svg aria-labelledby="cds-react-aria-653-title" class="css-1lzqdox" fill="none" focusable="false" height="16" id="bkmrk--23" role="img" viewbox="0 0 16 16" width="16"></svg>](https://docs.oracle.com/cd/E19683-01/806-4075/ipov-10/index.html)
- *.* System administration guide, volume 3.
- Study CCNA. (n.d.). [*OSI &amp; TCP/IP models*<svg aria-labelledby="cds-react-aria-654-title" class="css-1lzqdox" fill="none" focusable="false" height="16" id="bkmrk--24" role="img" viewbox="0 0 16 16" width="16"></svg>](https://study-ccna.com/osi-tcp-ip-models/)

- *.*

[The OSI model<svg aria-labelledby="cds-react-aria-655-title" class="css-1lzqdox" fill="none" focusable="false" height="16" id="bkmrk--25" role="img" viewbox="0 0 16 16" width="16"></svg>](https://www.coursera.org/learn/networks-and-network-security/supplement/YbKL0/the-osi-model-explained)

- Cloudflare. (n.d.). [*What is the OSI model?*<svg aria-labelledby="cds-react-aria-656-title" class="css-1lzqdox" fill="none" focusable="false" height="16" id="bkmrk--26" role="img" viewbox="0 0 16 16" width="16"></svg>](https://www.cloudflare.com/learning/ddos/glossary/open-systems-interconnection-model-osi/)
- 
- FreeCodeCamp. (2020, December 21). [*The OSI Model – The 7 Layers of Networking Explained in Plain English*<svg aria-labelledby="cds-react-aria-657-title" class="css-1lzqdox" fill="none" focusable="false" height="16" id="bkmrk--27" role="img" viewbox="0 0 16 16" width="16"></svg>](https://www.freecodecamp.org/news/osi-model-networking-layers-explained-in-plain-english/)
- .
- Imperva. (n.d.). [*OSI Model*<svg aria-labelledby="cds-react-aria-658-title" class="css-1lzqdox" fill="none" focusable="false" height="16" id="bkmrk--28" role="img" viewbox="0 0 16 16" width="16"></svg>](https://www.imperva.com/learn/application-security/osi-model/#:~:text=The%20session%20layer%20creates%20communication,closing%20them%20when%20communication%20ends)

- *.* Application security.

[Components of network layer communication<svg aria-labelledby="cds-react-aria-659-title" class="css-1lzqdox" fill="none" focusable="false" height="16" id="bkmrk--29" role="img" viewbox="0 0 16 16" width="16"></svg>](https://www.coursera.org/learn/networks-and-network-security/supplement/IRnxH/components-of-network-layer-communication)

- Agnė Srėbaliūtė. (2022, Aug 2). [*IPv4 packet header: Format and structure*<svg aria-labelledby="cds-react-aria-660-title" class="css-1lzqdox" fill="none" focusable="false" height="16" id="bkmrk--30" role="img" viewbox="0 0 16 16" width="16"></svg>](https://www.ipxo.com/blog/ipv4-packet-header/)
- . IPXO.
- Rajinder Kaur (2009) [*IPv4 Header*<svg aria-labelledby="cds-react-aria-661-title" class="css-1lzqdox" fill="none" focusable="false" height="16" id="bkmrk--31" role="img" viewbox="0 0 16 16" width="16"></svg>](https://advancedinternettechnologies.wordpress.com/ipv4-header/)
- . Advanced Internet Technologies.
- Gsephrioth. (2017). [*The IP diagram*<svg aria-labelledby="cds-react-aria-662-title" class="css-1lzqdox" fill="none" focusable="false" height="16" id="bkmrk--32" role="img" viewbox="0 0 16 16" width="16"></svg>](https://gsephrioth.github.io/Ch8-IP-Datagram/)

- *.*
- Wright, Robert. (October 1998). *IP Routing Primer*. O’Reilly.

# Week 2: Network operations

## Citations

[Network protocols<svg aria-labelledby="cds-react-aria-663-title" class="css-1lzqdox" fill="none" focusable="false" height="16" id="bkmrk--33" role="img" viewbox="0 0 16 16" width="16"></svg>](https://www.coursera.org/learn/networks-and-network-security/lecture/PUGBB/network-protocols)

- National Institute of Standards and Technology. (n.d.). [*Glossary*<svg aria-labelledby="cds-react-aria-664-title" class="css-1lzqdox" fill="none" focusable="false" height="16" id="bkmrk--34" role="img" viewbox="0 0 16 16" width="16"></svg>](https://csrc.nist.gov/glossary)

- *.* Accessed December 2022.

[Common network protocols<svg aria-labelledby="cds-react-aria-665-title" class="css-1lzqdox" fill="none" focusable="false" height="16" id="bkmrk--35" role="img" viewbox="0 0 16 16" width="16"></svg>](https://www.coursera.org/learn/networks-and-network-security/supplement/Tsifz/common-network-protocols)

- Cloudflare. (n.d.). [*What is a protocol? | Network protocol definition*<svg aria-labelledby="cds-react-aria-666-title" class="css-1lzqdox" fill="none" focusable="false" height="16" id="bkmrk--36" role="img" viewbox="0 0 16 16" width="16"></svg>](https://www.cloudflare.com/learning/network-layer/what-is-a-protocol/)
- *.*
- CompTIA. (n.d.). [*What is a network protocol and how does it work?* <svg aria-labelledby="cds-react-aria-667-title" class="css-1lzqdox" fill="none" focusable="false" height="16" id="bkmrk--37" role="img" viewbox="0 0 16 16" width="16"></svg>](https://www.comptia.org/content/guides/what-is-a-network-protocol)
- 
- Oracle. (n.d.). [*TCP/IP protocol architecture model*<svg aria-labelledby="cds-react-aria-668-title" class="css-1lzqdox" fill="none" focusable="false" height="16" id="bkmrk--38" role="img" viewbox="0 0 16 16" width="16"></svg>](https://docs.oracle.com/cd/E19683-01/806-4075/ipov-10/index.html)

- *.* System administration guide, volume 3.

[Additional network protocols <svg aria-labelledby="cds-react-aria-669-title" class="css-1lzqdox" fill="none" focusable="false" height="16" id="bkmrk--39" role="img" viewbox="0 0 16 16" width="16"></svg>](https://www.coursera.org/learn/networks-and-network-security/supplement/gh97f/additional-network-protocols)

- IBM. (2022, Oct 17). [*TCP/IP address and parameter assignment - Dynamic host configuration protocol*<svg aria-labelledby="cds-react-aria-670-title" class="css-1lzqdox" fill="none" focusable="false" height="16" id="bkmrk--40" role="img" viewbox="0 0 16 16" width="16"></svg>](https://www.ibm.com/docs/en/aix/7.1?topic=tcpp-tcpip-address-parameter-assignment-dynamic-host-configuration-protocol)
- . IBM AIX documentation.
- Microsoft. (n.d.O). [*What are IMAP and POP?*<svg aria-labelledby="cds-react-aria-671-title" class="css-1lzqdox" fill="none" focusable="false" height="16" id="bkmrk--41" role="img" viewbox="0 0 16 16" width="16"></svg>](https://support.microsoft.com/en-us/office/what-are-imap-and-pop-ca2c5799-49f9-4079-aefe-ddca85d5b1c9)
- Microsoft Support.
- Microsoft. (2013, October 21). [*SMTP*<svg aria-labelledby="cds-react-aria-672-title" class="css-1lzqdox" fill="none" focusable="false" height="16" id="bkmrk--42" role="img" viewbox="0 0 16 16" width="16"></svg>](https://learn.microsoft.com/en-us/previous-versions/office/developer/exchange-server-2010/aa494182(v=exchg.140))

- *.*

[The evolution of wireless security protocols<svg aria-labelledby="cds-react-aria-673-title" class="css-1lzqdox" fill="none" focusable="false" height="16" id="bkmrk--43" role="img" viewbox="0 0 16 16" width="16"></svg>](http://coursera.org/learn/networks-and-network-security/supplement/x73QK/overview-of-wireless-security-protocols)

- Asus. (2022, January 14).  [*\[Wireless\] What is WPA3? What are the advantages of using WPA3?*<svg aria-labelledby="cds-react-aria-674-title" class="css-1lzqdox" fill="none" focusable="false" height="16" id="bkmrk--44" role="img" viewbox="0 0 16 16" width="16"></svg>](https://www.asus.com/support/FAQ/1042478/)
- FAQ.
- Britannica, T. Editors of Encyclopaedia (2022, February 3). [*Wi-Fi*<svg aria-labelledby="cds-react-aria-675-title" class="css-1lzqdox" fill="none" focusable="false" height="16" id="bkmrk--45" role="img" viewbox="0 0 16 16" width="16"></svg>](https://www.britannica.com/technology/Wi-Fi)
- . *Encyclopedia Britannica*.
- Cisco Press. (2010, April 9). [*Moving to WPA/WPA2-Enterprise wi-fi encryption*<svg aria-labelledby="cds-react-aria-676-title" class="css-1lzqdox" fill="none" focusable="false" height="16" id="bkmrk--46" role="img" viewbox="0 0 16 16" width="16"></svg>](https://www.ciscopress.com/articles/article.asp?p=1576225)

- *.*

[Firewalls and network security measures <svg aria-labelledby="cds-react-aria-677-title" class="css-1lzqdox" fill="none" focusable="false" height="16" id="bkmrk--47" role="img" viewbox="0 0 16 16" width="16"></svg>](https://www.coursera.org/learn/networks-and-network-security/lecture/TrOAQ/firewalls-and-network-security-measures)

- Cisco. (n.d.). [*What is a firewall?* <svg aria-labelledby="cds-react-aria-678-title" class="css-1lzqdox" fill="none" focusable="false" height="16" id="bkmrk--48" role="img" viewbox="0 0 16 16" width="16"></svg>](https://www.cisco.com/c/en/us/products/security/firewalls/what-is-a-firewall.html)

- 

[Subnetting and CIDR<svg aria-labelledby="cds-react-aria-679-title" class="css-1lzqdox" fill="none" focusable="false" height="16" id="bkmrk--49" role="img" viewbox="0 0 16 16" width="16"></svg>](https://www.coursera.org/learn/networks-and-network-security/supplement/OObvl/subnetting-and-cidr)

- Cloudflare. (n.d.).[ *What is a subnet?*<svg aria-labelledby="cds-react-aria-680-title" class="css-1lzqdox" fill="none" focusable="false" height="16" id="bkmrk--50" role="img" viewbox="0 0 16 16" width="16"></svg>](https://www.cloudflare.com/learning/network-layer/what-is-a-subnet/)
- 
- Techopedia. (2017, July 18). [*Subnetting*<svg aria-labelledby="cds-react-aria-681-title" class="css-1lzqdox" fill="none" focusable="false" height="16" id="bkmrk--51" role="img" viewbox="0 0 16 16" width="16"></svg>](https://www.techopedia.com/definition/28328/subnetting)
- *.* Dictionary.
- IP Address Guide. (n.d.). [*CIDR to IPv4 Conversion*<svg aria-labelledby="cds-react-aria-682-title" class="css-1lzqdox" fill="none" focusable="false" height="16" id="bkmrk--52" role="img" viewbox="0 0 16 16" width="16"></svg>](https://www.ipaddressguide.com/cidr)

- . IPV4 Tools.

[Proxy servers<svg aria-labelledby="cds-react-aria-683-title" class="css-1lzqdox" fill="none" focusable="false" height="16" id="bkmrk--53" role="img" viewbox="0 0 16 16" width="16"></svg>](https://www.coursera.org/learn/networks-and-network-security/lecture/P0Wj5/securing-internal-networks-proxy-servers)

- National Institute of Standards and Technology. (n.d.). [*Glossary*<svg aria-labelledby="cds-react-aria-684-title" class="css-1lzqdox" fill="none" focusable="false" height="16" id="bkmrk--54" role="img" viewbox="0 0 16 16" width="16"></svg>](https://csrc.nist.gov/glossary)

- *.* Accessed December 2022.

# Week 3: Secure against network intrusions

## Resources

[Analyze network attacks<svg aria-labelledby="cds-react-aria-685-title" class="css-1lzqdox" fill="none" focusable="false" height="16" id="bkmrk--55" role="img" viewbox="0 0 16 16" width="16"></svg>](https://www.coursera.org/learn/networks-and-network-security/item/QHIX5)

- [CompTIA<svg aria-labelledby="cds-react-aria-686-title" class="css-1lzqdox" fill="none" focusable="false" height="16" id="bkmrk--56" role="img" viewbox="0 0 16 16" width="16"></svg>](https://www.comptia.org/blog/cybersecurity-skills-to-counter-ddos-attacks.)

- 

## Citations

[The case for securing networks <svg aria-labelledby="cds-react-aria-687-title" class="css-1lzqdox" fill="none" focusable="false" height="16" id="bkmrk--57" role="img" viewbox="0 0 16 16" width="16"></svg>](https://www.coursera.org/learn/networks-and-network-security/lecture/ZnVPC/the-case-for-securing-networks)

- Vinton, Kate. (2014, September 18). [*With 56 million cards compromised, Home Depot’s breach is bigger than Target’s*<svg aria-labelledby="cds-react-aria-688-title" class="css-1lzqdox" fill="none" focusable="false" height="16" id="bkmrk--58" role="img" viewbox="0 0 16 16" width="16"></svg>](https://www.forbes.com/sites/katevinton/2014/09/18/with-56-million-cards-compromised-home-depots-breach-is-bigger-than-targets/?sh=1514b8a53e74)

- *.* Forbes.

[Analyze network layer communication<svg aria-labelledby="cds-react-aria-689-title" class="css-1lzqdox" fill="none" focusable="false" height="16" id="bkmrk--59" role="img" viewbox="0 0 16 16" width="16"></svg>](https://www.coursera.org/learn/networks-and-network-security/quiz/6XQKU/activity-apply-os-hardening-techniques)

- Lager, Nathan. (2020, April 3). [Network Troubleshooting with Packet Captures<svg aria-labelledby="cds-react-aria-690-title" class="css-1lzqdox" fill="none" focusable="false" height="16" id="bkmrk--60" role="img" viewbox="0 0 16 16" width="16"></svg>](https://www.redhat.com/sysadmin/network-packet-captures)
- . Enable Sysadmin.
- Oracle. (n.d.) [How the TCP/IP Protocols Handle Data Communications (System Administration Guide: IP Services<svg aria-labelledby="cds-react-aria-691-title" class="css-1lzqdox" fill="none" focusable="false" height="16" id="bkmrk--61" role="img" viewbox="0 0 16 16" width="16"></svg>](https://docs.oracle.com/cd/E19683-01/806-4075/ipov-100/index.html)

- ).

[Real-life DDoS attack<svg aria-labelledby="cds-react-aria-692-title" class="css-1lzqdox" fill="none" focusable="false" height="16" id="bkmrk--62" role="img" viewbox="0 0 16 16" width="16"></svg>](https://www.coursera.org/learn/networks-and-network-security/supplement/9ndLQ/real-life-ddos-attack)

- Olenick, D. (2020, December 10) [*Guilty plea in 2016 Dyn DDos attack*<svg aria-labelledby="cds-react-aria-693-title" class="css-1lzqdox" fill="none" focusable="false" height="16" id="bkmrk--63" role="img" viewbox="0 0 16 16" width="16"></svg>](https://www.bankinfosecurity.com/guilty-plea-in-2016-dyn-ddos-attack-a-15567#:~:text=Federal%20prosecutors%20estimate%20the%20attack,million%20due%20to%20the%20attack.)
- *.* Bank info security.
- Young, K (2022, January 10) [*Cyber case study: The Mirai DDoS attack on Dyn*<svg aria-labelledby="cds-react-aria-694-title" class="css-1lzqdox" fill="none" focusable="false" height="16" id="bkmrk--64" role="img" viewbox="0 0 16 16" width="16"></svg>](https://coverlink.com/case-study/mirai-ddos-attack-on-dyn/#:~:text=On%20Oct.,systems%20and%20overwhelm%20its%20infrastructure)

- . Coverlink.

[Overview of interception attacks<svg aria-labelledby="cds-react-aria-695-title" class="css-1lzqdox" fill="none" focusable="false" height="16" id="bkmrk--65" role="img" viewbox="0 0 16 16" width="16"></svg>](https://www.coursera.org/learn/networks-and-network-security/supplement/zCdHP/overview-of-interception-tactics)

- Engebretson, P. (2013). *The basics of hacking and penetration testing: ethical hacking and penetration testing made easy*. Elsevier.

# Week 4: Security hardening

## Resources

[Course 3 glossary <svg aria-labelledby="cds-react-aria-696-title" class="css-1lzqdox" fill="none" focusable="false" height="16" id="bkmrk--66" role="img" viewbox="0 0 16 16" width="16"></svg>](https://www.coursera.org/learn/networks-and-network-security/supplement/lFqNR/course-3-glossary)

[Apply OS hardening techniques<svg aria-labelledby="cds-react-aria-697-title" class="css-1lzqdox" fill="none" focusable="false" height="16" id="bkmrk--67" role="img" viewbox="0 0 16 16" width="16"></svg>](https://www.coursera.org/learn/networks-and-network-security/quiz/6XQKU/activity-apply-os-hardening-techniques)

- [Opensource.com<svg aria-labelledby="cds-react-aria-698-title" class="css-1lzqdox" fill="none" focusable="false" height="16" id="bkmrk--68" role="img" viewbox="0 0 16 16" width="16"></svg>](https://opensource.com/article/18/10/introduction-tcpdump)
- 
- [Iana.org<svg aria-labelledby="cds-react-aria-699-title" class="css-1lzqdox" fill="none" focusable="false" height="16" id="bkmrk--69" role="img" viewbox="0 0 16 16" width="16"></svg>](http://iana.org)
- 
- [Geekflare<svg aria-labelledby="cds-react-aria-700-title" class="css-1lzqdox" fill="none" focusable="false" height="16" id="bkmrk--70" role="img" viewbox="0 0 16 16" width="16"></svg>](https://geekflare.com/tcpdump-examples/)
- 
- [Packet Pushers<svg aria-labelledby="cds-react-aria-701-title" class="css-1lzqdox" fill="none" focusable="false" height="16" id="bkmrk--71" role="img" viewbox="0 0 16 16" width="16"></svg>](https://packetpushers.net/masterclass-tcpdump-interpreting-output/)

- 

## Citations

[OS hardening practices <svg aria-labelledby="cds-react-aria-702-title" class="css-1lzqdox" fill="none" focusable="false" height="16" id="bkmrk--72" role="img" viewbox="0 0 16 16" width="16"></svg>](https://www.coursera.org/learn/networks-and-network-security/lecture/sj35a/os-hardening-practices)

- National Institute of Security Technology. (2018, October). [*Guide to securing macOS 10.12 systems for IT professionals*<svg aria-labelledby="cds-react-aria-703-title" class="css-1lzqdox" fill="none" focusable="false" height="16" id="bkmrk--73" role="img" viewbox="0 0 16 16" width="16"></svg>](https://csrc.nist.gov/CSRC/media/Publications/sp/800-179/rev-1/draft/documents/sp800-179r1-draft.pdf)

- *.* Special publication 800-179, revision 1. Accessed December 2022.

[Apply OS hardening techniques<svg aria-labelledby="cds-react-aria-704-title" class="css-1lzqdox" fill="none" focusable="false" height="16" id="bkmrk--74" role="img" viewbox="0 0 16 16" width="16"></svg>](https://www.coursera.org/learn/networks-and-network-security/quiz/6XQKU/activity-apply-os-hardening-techniques)

- Doropoulos, N. (n.d.). [DNS Query Flood Attack. <svg aria-labelledby="cds-react-aria-705-title" class="css-1lzqdox" fill="none" focusable="false" height="16" id="bkmrk--75" role="img" viewbox="0 0 16 16" width="16"></svg>](https://www.linkedin.com/pulse/dns-query-flood-attack-nicholas-doropoulos.)

- Linkedin.

[Use the NIST Cybersecurity Framework to respond to a security<svg aria-labelledby="cds-react-aria-706-title" class="css-1lzqdox" fill="none" focusable="false" height="16" id="bkmrk--76" role="img" viewbox="0 0 16 16" width="16"></svg>](https://www.coursera.org/learn/networks-and-network-security/exam/AFji2/portfolio-activity-use-the-nist-cybersecurity-framework-to-respond-to-a-security)

- Bhardwaj, P. (2023, January 2). [How to detect an ICMP flood attack and protect your network.<svg aria-labelledby="cds-react-aria-707-title" class="css-1lzqdox" fill="none" focusable="false" height="16" id="bkmrk--77" role="img" viewbox="0 0 16 16" width="16"></svg>](https://www.makeuseof.com/how-to-detect-icmp-flood-attack/)

- 

Firch, J. (2023, February 28). [How to prevent a ICMP flood attack. <svg aria-labelledby="cds-react-aria-708-title" class="css-1lzqdox" fill="none" focusable="false" height="16" id="bkmrk--78" role="img" viewbox="0 0 16 16" width="16"></svg>](https://purplesec.us/prevent-ping-attacks/)

Google, Android, Chronicle, Google Drive, Google Sites, and YARA are trademarks owned by Google LLC. All other trademarks belong to their respective owners and are not affiliated with Google LLC.