You are viewing a free preview of this lesson.
Subscribe to unlock all 10 lessons in this course and every other course on LearningBro.
Network security protects the infrastructure that connects systems, applications, and users. It encompasses hardware, software, policies, and practices designed to prevent unauthorised access, misuse, and attacks on network resources.
Defence in depth is a layered security strategy — if one control fails, another catches the attack:
┌─────────────────────────────────┐
│ Perimeter (Firewall, WAF) │
│ ┌───────────────────────────┐ │
│ │ Network (IDS/IPS, Seg.) │ │
│ │ ┌─────────────────────┐ │ │
│ │ │ Host (EDR, AV) │ │ │
│ │ │ ┌───────────────┐ │ │ │
│ │ │ │ Application │ │ │ │
│ │ │ │ ┌─────────┐ │ │ │ │
│ │ │ │ │ Data │ │ │ │ │
│ │ │ │ └─────────┘ │ │ │ │
│ │ │ └───────────────┘ │ │ │
│ │ └─────────────────────┘ │ │
│ └───────────────────────────┘ │
└─────────────────────────────────┘
Firewalls filter traffic based on rules:
| Type | Description |
|---|---|
| Packet filter | Inspects individual packets (source/destination IP, port, protocol) |
| Stateful inspection | Tracks connection state — allows return traffic for established connections |
| Application layer (proxy) | Inspects application-layer content (HTTP, DNS, SMTP) |
| Next-Generation Firewall (NGFW) | Combines stateful inspection, deep packet inspection, IPS, and application awareness |
| # | Action | Source | Destination | Port | Protocol |
|---|---|---|---|---|---|
| 1 | Allow | 10.0.0.0/24 | Any | 443 | TCP |
| 2 | Allow | Any | 10.0.1.5 | 80, 443 | TCP |
| 3 | Allow | 192.168.1.10 | 10.0.2.0/24 | 22 | TCP |
| 4 | Deny | Any | Any | Any | Any |
Tip: Always end firewall rules with a default deny rule. Only allow what is explicitly needed.
Monitors network traffic and alerts on suspicious activity:
Actively blocks malicious traffic:
| Method | Description |
|---|---|
| Signature-based | Matches traffic against known attack patterns |
| Anomaly-based | Detects deviations from normal baseline behaviour |
| Heuristic | Uses rules and algorithms to identify suspicious behaviour |
| Tool | Type | Notes |
|---|---|---|
| Snort | IDS/IPS | Open-source, signature-based |
| Suricata | IDS/IPS | Open-source, multi-threaded, supports Snort rules |
| Zeek (Bro) | Network Security Monitor | Focus on protocol analysis and logging |
VPNs create encrypted tunnels for secure communication:
Subscribe to continue reading
Get full access to this lesson and all 10 lessons in this course.