In this video, the OSI and TCP/IP models are discussed and compared at a high level. Note that TCP/IP’s bottom two layers are called a lot of different things (ie, Network = Internet, Physical = Network Interface, Network Access, Link, Physical) but I’ve carried network and physical over from OSI to TCP/IP to provide clarity here.
Keep in mind that OSI model is not laws of physics. It is only a guideline. While many protocols fit neatly into one of the seven layers, others do not. But OSI
Follow the Insanity at: https://www.FailedNormal.com Downloadable Podcasts at: https://failednormal.podbean.com iTunes: https://itunes.apple.com/us/podcast/fail
The F5 Advanced Web Application Firewall (WAF) provides a powerful set of security features that will keep your Web Applications safe from attack. Many WAFs of
Internet traffic today is encrypted at a rate of between 80% and 90%. While encryption is a great benefit to securing web traffic, it also presents a problem f
John outlines the details of the DDoS attack that targeted the popular GitHub website. It was the largest DDoS attack ever in recorded history. The attackers
Learn computer network layers or OSI layers in a computer network, OSI Model, OSI reference model or open system interconnection model or networking model inclu
An Intrusion Prevention System (IPS) is designed to block malicious traffic from accessing your network. And, a Web Application Firewall (WAF) is also designed
Jason Rahm introduces the overall strategy of BIG-IP DNS load balancing, and how it differs from LTM options. LB Algorithms will be covered in future videos.
Video 8/10 on the 2017 OWASP Top Ten Security Risks. John Wagnon discusses the details of the #8 vulnerability listed in this year's OWASP Top 10 Security Risk
This is an animated video that explains the difference between a hub, switch, and a router. It explains how a router works, how a switch works and how a hub wo
This video will illustrate everything that happens to describe how packets travel through a network. Specifically, we will look at every step to get a packet fr
Jason Rahm reaches into his "router guy" past to give a brief overview on the border gateway routing protocol (bgp) that keeps the internet duct taped together.
This is an animated video explaining the difference between TCP and UDP protocols. What is TCP? What is UDP? Transmission control protocol vs user datagram p
Welcome to the ITFreeTraining video on the OSI Model. This video will look at the OSI model and in particular, how it relates to the internet protocol. Access
Traditional network firewalls (Layer 3-4) do a great job preventing outsiders from accessing internal networks. But, these firewalls offer little to no support
John walks through the process of the TLS handshake between client and server (BIG-IP).
Video 7/10 on the 2017 OWASP Top Ten Security Risks. John Wagnon discusses the details of the #7 vulnerability listed in this year's OWASP Top 10 Security Risk
This is the big picture explanation of the TCP/IP protocol and how it maps to the OSI model. The big picture covers the OSI model layers and their functions, TC