From the course: CCNA Cybersecurity (200-201) v1.2 Cert Prep
Unlock this course with a free trial
Join today to access over 25,200 courses taught by industry experts.
The 5-tuple approach
From the course: CCNA Cybersecurity (200-201) v1.2 Cert Prep
The 5-tuple approach
(bright music) - [Narrator] Let's now take a look at the 5-Tuple Approach. And this approach is to use a set of five key elements of a network communication session that will uniquely identify that session. And it's important to understand that a communication session is unidirectional. For example, let's say that on my PC, I have a Secure Shell session going with a Linux host. Well, that communication flow going back and forth between my PC and the Linux host, that would actually consist of two sessions. One session is from my PC to the Linux host, and the other session is from the Linux host back to my PC. That way a single session always has a single source and destination. For example, let's say that we have an HTTPS session going from this source PC to this destination web server. And let's consider the five Tuples that we would use to identify the session going from the source to the destination. The first Tuple is the source IP address, the IP address of that PC, which is…
Practice while you learn with exercise files
Download the files the instructor uses to teach the course. Follow along and learn by watching, listening and practicing.
Contents
-
-
-
(Locked)
Module 1: Foundations of digital defense1m 14s
-
(Locked)
Cybersecurity defined3m 50s
-
(Locked)
The CIA triad4m 11s
-
(Locked)
Vulnerabilities, threats, exploits, and risks2m 24s
-
(Locked)
Cybersecurity terminology4m 36s
-
Defense in depth8m 43s
-
(Locked)
Network security solutions10m 25s
-
(Locked)
Endpoint security solutions5m 15s
-
(Locked)
Application security solutions3m 45s
-
(Locked)
Agent-based vs. agentless security solutions7m 38s
-
(Locked)
SIEM and SOAR5m 28s
-
(Locked)
Virtualized solutions7m 45s
-
(Locked)
Cloud-based solutions4m 38s
-
(Locked)
Access control model options5m 58s
-
(Locked)
Common Vulnerability Scoring System (CVSS)4m 49s
-
(Locked)
Data visibility considerations2m 8s
-
(Locked)
Data loss analysis2m 17s
-
(Locked)
The 5-tuple approach3m 46s
-
(Locked)
Detection methods3m 25s
-
(Locked)
-
-
-
-
-
-