Skip to main content
Skip to footer
Search
Connect
Watch fullscreen
1
Bookmark
Share
Add to Playlist
Report
CCNA Cyber Ops SECFND 210-250 Lecture 1 (TCP-IP fundamentals)
UrduITacademy
Follow
24/04/2024
Category
📚
Learning
Transcript
Display full video transcript
00:00
bismillahirrahmanirrahim assalamu alaikum welcome back
00:03
and we have come to lecture number 1
00:07
CCNA cyber op security fundamental lecture
00:11
210-250 you know about the book
00:14
we are reading this book if you buy the library
00:17
210-250 and 210-255
00:20
security fundamental and security operations
00:23
we will cover both of them
00:25
so lets start
00:27
there is no catch up, TCPIP is fundamental
00:29
before starting all this work
00:31
let me give you a suggestion
00:33
that you go to urdu it academy
00:37
this is urdu it academy
00:39
go to courses, cisco
00:41
and this CCNA ICND 1
00:43
i assume you have read all of this
00:45
because this is very important for you to read
00:48
without this i have no point
00:51
to try to reinvent the wheel
00:55
this is the best shot we have given
00:57
everyone who works at the SOC
00:59
should know about TCPIP
01:01
this is protocol suite
01:03
fundamental of IP packet
01:05
OSI layer model
01:07
application presentation session
01:09
transport layer
01:11
IP addresses
01:13
169.254 IP addresses
01:15
because one day
01:17
you will be sitting in a SOC
01:19
and you will be monitoring
01:21
some security activity
01:23
and you will see
01:25
there is an IP address
01:27
which is coming from 169.254
01:29
and it is producing some traffic
01:31
and your colleague
01:33
will tell you
01:35
this is a malicious IP address
01:37
this is a strange behavior
01:39
this is a Chinese IP address
01:41
so you will be sitting there
01:43
and will say this is a misconfiguration
01:45
this is not security
01:47
now when you will be talking
01:49
with your legs crossed
01:51
it means you know these things
01:53
so you have to be on that level
01:55
you should know about TCP3 way handshake
01:57
you should know about UDP
01:59
what is the difference between TCP and UDP
02:01
I will give you a common example
02:03
one day a guy will say
02:05
you opened UDP port 23
02:07
and I can't check
02:09
I will tell you a common thing
02:11
if you have
02:13
I don't have a telnet port
02:15
open
02:17
if you want to see your access
02:19
to a server
02:21
so you will do
02:23
telnet
02:25
cisco.com
02:27
space 80
02:29
and you will see a blank screen
02:31
you will say
02:33
port 80 is open
02:35
now what will happen
02:37
he will say you opened port 80
02:39
but I am doing telnet
02:41
so port 80 is not opening
02:43
this is a common troubleshooting
02:45
if you want to use port 443
02:47
you will type 443
02:49
and it will show
02:51
if 443 is open or not
02:53
now
02:55
what he was doing
02:57
he said I did telnet
02:59
and you said 443
03:01
or 123 port is not opening
03:03
I said telnet is a protocol of TCP
03:05
and I opened port UDP
03:07
so
03:09
I didn't have to google
03:11
you should know these basic things
03:13
this is a networking 101
03:15
type thing
03:17
you should know
03:19
ARP reverse
03:21
DCP
03:23
ICMP
03:25
many people ask
03:27
to confuse people
03:29
tell me
03:31
which port does ICMP work
03:33
if I ask you this
03:35
you will be confused
03:37
which port does ICMP work
03:39
ICMP is a different protocol
03:41
it doesn't use TCP UDP
03:43
ICMP uses ICMP protocol
03:45
how to do packet delivery
03:47
I have explained it in detail
03:49
so
03:51
let's start OSI layer model
03:53
we know OSI layer model
03:55
what are bridges
03:57
switch hub and router
03:59
if you don't know
04:01
go back
04:03
we know data
04:05
and here
04:07
we have segmentation
04:09
here packets
04:11
here frames
04:13
what are segments
04:15
what are packets
04:17
application layer, presentation layer, session layer
04:19
transport layer, headers
04:21
network layer
04:23
IP header, data link layer
04:25
frames, MAC addresses
04:27
physical layer
04:29
we know all these things
04:31
4 layer TCP IP model
04:33
ISO layer model
04:35
is of 7 layers
04:37
4 layer TCP IP model
04:39
also
04:41
4 layer TCP IP model
04:43
TCP IP stack
04:45
or
04:47
DOD model
04:49
Department of Defense
04:51
1974 protocol of packets
04:53
network
04:55
in 1982
04:57
TCP IP DOD
04:59
Department of Defense
05:01
to connect all devices
05:03
ARPANET
05:05
switch towards TCP
05:07
NCP
05:09
legacy protocol
05:13
history layers
05:15
in 1960
05:17
ARPANET
05:19
DARPA
05:21
internet
05:23
published in 1984
05:25
OSI
05:27
7 layer model
05:29
in 1983
05:31
ARPANET
05:33
TCP
05:35
OSI
05:37
4 layer TCP IP
05:39
7 layer OSI
05:41
map
05:43
TCP IP stack
05:45
OSI
05:47
TCP IP application
05:49
OSI model
05:51
application
05:53
presentation
05:55
SMTP services
05:57
HTTP
05:59
application
06:01
TCP IP
06:03
application transport
06:05
physical layer
06:07
ATIP
06:13
ATIP
06:15
ATIP
06:17
ATIP
06:19
ATIP
06:21
ATIP
06:23
ATIP
06:25
ATIP
06:27
ATIP
06:29
ATIP
06:31
ATIP
06:33
UDP
06:35
UDP
06:37
TCP port 80
06:39
TCP header
06:41
TCP encapsulation
06:43
IP
06:45
IP address
06:47
IP address
06:49
Ethernet
06:51
Ethernet
06:53
Ethernet
06:55
Ethernet
06:57
Ethernet
06:59
Ethernet
07:01
so 1,2,3,4 these are the 4 layers
07:05
this is the encapsulation
07:08
when it reached the receiving end
07:10
it first removed Ethernet header
07:12
then IP header
07:13
then TCP header
07:14
then HTTP post request
07:15
and sent it to the server
07:17
and the web services running behind it
07:19
it processed it and did whatever needed to be done
07:21
ok
07:22
tell me one very interesting thing
07:24
I think I haven't taught this
07:26
one person asked me in an interview
07:28
that the communication between a server and a client
07:34
tell it in as much detail as you can
07:37
I told OSI layer model and everything
07:40
but what I was lacking at that time
07:42
was that when you are pulling data from HTTP
07:46
rendering it and showing it in your browser
07:49
it would have been better if you told that detail too
07:52
well, I didn't get that job
07:54
anyway
07:55
after that we go to the IP protocol
07:58
this is the IP protocol
07:59
the TCP we were talking about
08:01
this is the IP protocol
08:03
we are talking about the inter-network layer
08:05
we are not reading the TCP header
08:07
we are reading the IP header
08:08
I have explained it in detail
08:09
layer 3 of OSI model
08:11
ok
08:12
connectionless protocol
08:13
where is the connectionless protocol
08:15
ok
08:16
don't worry about the sequencing
08:17
addressing network and host IP addresses
08:19
network ID, host ID
08:21
this is the IP protocol
08:22
that's why connectionless is written
08:25
ignore it
08:26
so this is your entire header
08:27
ok
08:28
what is the purpose of teaching this
08:29
because this is the IPv4 header
08:31
after this we have to see IPv6
08:33
ok
08:34
so this is the version
08:35
0 to 4
08:36
what version of IP version 4
08:38
you are using
08:39
IP header length
08:40
this is the IP header
08:41
this is a bit out of sync
08:42
ok
08:43
this is the version
08:44
ok
08:45
this is the IP header length
08:46
minimum of 20 bytes
08:47
ok
08:48
type of service
08:49
8 bits are used in this
08:50
for quality of services
08:51
DSCP takes 6 bits
08:53
ok
08:54
2 for congestion notification
08:55
if there is congestion in the network
08:56
ok
08:57
entire length of packet
08:58
ok
08:59
this is 65,535 bytes
09:01
of entire header
09:03
that's why there are so many bits
09:04
which can be presented
09:05
ok
09:06
16 to 31
09:07
how many will be there
09:08
16 will be there
09:09
and then
09:10
these 3 fields are used
09:11
for the fragmentation of packet
09:12
and identifying them
09:13
and using them
09:14
to resamble
09:15
identification
09:16
assembly
09:17
disassembly
09:18
whatever it is
09:19
flag
09:20
you know
09:21
fragment
09:22
ok
09:23
header
09:24
check
09:25
source
09:26
IP
09:27
destination
09:28
option
09:29
I remember
09:30
I discussed in the
09:31
previous lecture
09:32
that
09:33
whenever
09:34
someone is
09:35
telling you
09:36
this
09:37
then
09:38
he tells
09:39
version
09:40
blah blah
09:41
source
09:42
IP
09:43
destination
09:44
IP
09:45
option
09:46
padding
09:47
ok
09:48
all the stories
09:49
are lost
09:50
I have told
09:51
routing
09:52
decision
09:53
minus 1
09:54
increment
09:55
29
09:56
ok
09:57
what is the reason
09:58
not to create
09:59
loop
10:00
in the network
10:01
ok
10:02
if there is a packet
10:03
which is roaming
10:04
in the network
10:05
for no reason
10:06
when it is
10:07
on the
10:08
counter of 0
10:09
then
10:10
the router
10:11
will discard it
10:12
if it is
10:13
coming with
10:14
0 value
10:15
or
10:16
with 0 value
10:17
the way
10:18
it reaches
10:19
the router
10:20
ok
10:21
hackers
10:22
use
10:23
this
10:24
kind of
10:25
packets
10:26
ok
10:27
after that
10:28
comes
10:29
what IP
10:30
ok
10:31
this
10:32
is a
10:33
mistake
10:34
which
10:35
IP
10:36
header
10:37
field
10:38
help
10:39
preventing
10:40
the
10:41
loops
10:42
TTL
10:43
packet
10:44
prevents
10:45
loop
10:46
routing
10:47
loops
10:48
value
10:49
ok
10:50
A
10:51
class
10:52
127
10:53
RFC
10:54
1918
10:55
private
10:56
IP
10:57
address
10:58
A
10:59
class
11:00
B
11:01
class
11:02
C
11:03
RFC
11:04
1918
11:05
separate
11:06
IP
11:07
ranges
11:08
class
11:09
A
11:10
class
11:11
B
11:12
class
11:13
C
11:14
class
11:15
D
11:16
class
11:17
E
11:19
class
11:20
C
11:21
class
11:22
B
11:23
class
11:24
D
11:25
class
11:26
E
11:27
which
11:28
is
11:46
reserved
11:47
network addresses all 0s in the host portion, broadcast addresses all 1s in the host portion,
11:54
directly broadcast address 10.255.255.255, local broadcast address never broadcast outside
12:00
its local segment, local loopback address 127, RFC 3947, APIPA automatic private IP
12:08
addressing, 169.254.0.0, I cannot get to my DSCP server, what IP address my PC will get,
12:23
standard question, answer C, public and private IP addresses, IANA, IANA under ISOC, Internet
12:34
Society, Afrikanik, APNIC, ARIN, Latin America, RIPE, IPv4, RFC1918, 10, 172, 192, these are
13:01
private IP addresses, you do not browse on the internet with these IP addresses, you
13:06
should have a net in front of these IP addresses which is a public IP address, I have discussed
13:11
this in detail in ICND1, I think it is defined according to the plate of the car.
13:18
In IPv4, there are 4.3 billion addresses, IPv6, watch the lecture, in IPv6, I would
13:28
like to say that your header information has been simplified, identification flag, fragmentation,
13:35
header checksum, all these things have been removed because path fragmentation lies with
13:41
the host, it is the host's responsibility to send these things, host discovers the path
13:47
MQ before it sends the packet, and which fragment size to use, all these things are not put
13:54
in the header, and the fields that have been added, and the name that has been kept is the
14:01
version number, source address, destination address, and the new field that has been added
14:06
is the flow label, flow label possibly can be used for the QoS purpose, and IPv6 in short
14:13
has been simplified, now you can see in the IPv6 header there are 8 fields, IPv6 has 16
14:28
hexadecimal fields, watch the CCNA lecture, this is the unicast address, multicast address,
14:33
loopback address, unspecified networks go towards the default route, and this is the
14:39
way to define the unicast route,
15:09
Allah Hafiz
CCNA Cyber 210-255 SECOPS
15:14
|
Up next
CCNA Cyber Ops SECFND 210-250 Lecture 1 (TCP-IP fundamentals)
UrduITacademy
24/04/2024
15:14
CCNA Cyber Ops SECFND 210-250 Lecture 1 (TCP-IP fundamentals)
UrduITacademy
24/04/2024
11:14
CCNA Cyber Ops Introduction Lecture
UrduITacademy
24/04/2024
23:58
CCNA Security 640-554 Lecture 16
UrduITacademy
29/11/2014
18:02
CCNA Security 640-554 Lecture 7
UrduITacademy
17/08/2014
39:10
CCNA Security 640-554 Lecture 5
UrduITacademy
31/05/2014
17:46
CCNA Security 640-554 Lecture 1
UrduITacademy
16/03/2014
47:36
CCDA 640-864 Lecture 15
UrduITacademy
20/12/2013
Recommended
35:32
CCNA Cyber Ops SECFND 210-250 Lecture 2 (How TCP Works , Wireshark)
UrduITacademy
24/04/2024
11:46
How What and Why of Bug Bounty (FQA Bug bounty)
UrduITacademy
23/04/2024
17:17
What is Zero Trust Model What is Zero Trust Architecture Principles of Zero Trust Security ZTA
UrduITacademy
23/04/2024
7:37
Degree VS Certification (Skills vs Education) By Kashif Iqbal
UrduITacademy
23/04/2024
9:37
How To Handle Change In Life Dealing With Change Kaizen In Operations Management
UrduITacademy
23/04/2024
24:51
PA Firewall Essentials Lecture 17
UrduITacademy
08/02/2016
21:48
PA Firewall Essentials Lecture 16
UrduITacademy
29/12/2015
25:01
PA Firewall Essentials Lecture 15
UrduITacademy
22/12/2015
24:36
PA Firewall Essentials Lecture 14
UrduITacademy
20/12/2015
12:21
PA Firewall Essentials Lecture 13
UrduITacademy
13/12/2015
25:52
PA Firewall Essentials Lecture 12
UrduITacademy
13/12/2015
31:59
PA Firewall Essentials Lecture 11
UrduITacademy
29/11/2015
16:58
PA Firewall Essentials Lecture 10
UrduITacademy
29/11/2015
41:58
PA Firewall Essentials Lecture 9
UrduITacademy
22/11/2015
40:32
PA Firewall Essentials Lecture 8
UrduITacademy
15/11/2015
15:04
PA Firewall Essentials Lecture 7
UrduITacademy
15/11/2015
37:45
PA Firewall Essentials Lecture 6
UrduITacademy
31/10/2015
26:28
PA Firewall Essentials Lecture 5
UrduITacademy
31/10/2015
16:40
PA Firewall Essentials Lecture 4
UrduITacademy
17/10/2015
13:04
PA Firewall Essentials Lecture 3
UrduITacademy
17/10/2015
11:34
PA Firewall Essentials Lecture 2
UrduITacademy
11/10/2015
10:58
PA Firewall Essentials Lecture 1
UrduITacademy
11/10/2015
18:35
CCNP 300-115 Switch Lecture 4.avi
UrduITacademy
27/09/2015
0:51
Former Aide Claims She Was Asked to Make a ‘Hit List’ For Trump
Veuer
27/09/2023
1:08
Musk’s X Is ‘the Platform With the Largest Ratio of Misinformation or Disinformation’ Amongst All Social Media Platforms
Veuer
27/09/2023
4:50
59 companies that are changing the world: From Tesla to Chobani
Fortune
27/09/2023
0:46
3 Things to Know About Coco Gauff's Parents
People
23/09/2023
0:35
8 Things to Do in the Morning to Improve Productivity
Martha Stewart Living
22/09/2023