TryHackMe Network Security











>> YOUR LINK HERE: ___ http://youtube.com/watch?v=KcuEeJ6zBh0

Learn about network security, understand the attack methodology, plus you will get to practice hacking into a target server. • A computer network is a group of computers devices connected to each other. Network security focuses on protecting the security of these devices the links connecting them. • Network security refers to the devices, technologies, plus processes to protect the Confidentiality, Integrity, Availability (CIA) of a computer network the data on it. • Network security consists of different hardware software solutions to achieve the security goals. • Hardware solutions refer to the devices you set up in your network to protect your network security. • Hardware Appliances: • Firewall appliance: The firewall allows blocks connections based on a predefined set of rules. It restricts what can enter plus what can leave a network • Intrusion Detection System (IDS) appliance: An IDS detects system network intrusion attempts. It detects hackers attempting to break into your network • Intrusion Prevention System (IPS) appliance: An IPS blocks detected intrusions intrusion attempts. It prevents hackers from breaking into your network • Virtual Private Network (VPN) appliance: A VPN ensures that the network traffic cannot be read nor altered by a 3rd party. VPN's protect the Confidentiality Integrity of the data sent • • Software Security Solutions: • Antivirus Software: Install antivirus on your computer or smartphone to detect malicious files plus block them from executing • Host Firewall: Is a program that ships as part of your system, or it's a program that you install onto your system • • Breaking into a targeted network includes a number of steps; a.k.a (Attack Methodology) • • The Cyber Kill Chain has 7 important steps to memorise take note of: • 1. Recon: Reconnaissance, refers to the step where the hacker learns as much as possible about the target. Information types include: servers, operating system, IP addresses, names of users, email addresses etc... • 2. Weaponization: Preparing a file with a malicious component, to provide the hacker with remote access • 3. Delivery: Delivering the malicious file to the target via any feasible method, such as email or USB flash memory • 4. Exploitation: When the user clicks open the malicious file, their system executes the malicious component • 5. Installation: Step 4 [exploitation] installs the malware onto the target system • 6. Command Control [C2]: Successful installation of the malware provides the attacker with command control ability over the target system • 7. Actions on Objectives: After gaining control over a target system, the hacker has achieved their objectives, an example would be - stealing the target’s data • • ☕️ Please support me by buying me a coffee - thank-you ☕️ • ~ https://www.buymeacoffee.com/hacktolearn • • 💙💙💙💙💙💙💙💙💙💙💙💙💙 • FREE CYBER SECURITY RESOURCES : • ~ w3schools --- https://www.w3schools.com • ~ The Cyber Mentor --- https://academy.tcm-sec.com • ~ Nathan House --- https://www.stationx.net/nathan-house... • ~ John Hammond --- https://johnhammond.org • ~ Loi Liang --- https://loiliangyang.com • ~ David Bombal --- https://davidbombal.com • ~ Network Chuck --- https://networkchuck.com • ~ Professor Messer --- https://www.professormesser.com • ~ TryHackMe ------ https://tryhackme.com • • #networksecurity #beginnercybersecuritylessons

#############################









Content Report
Youtor.org / YTube video Downloader © 2025

created by www.youtor.org