KMU Cyber Security Tutorials

"Welcome to Kapasa Makasa University Cyber Security Tutorials! We are dedicated to providing high-quality educational resources and tutorials on all things related to cyber security. Whether you are a beginner looking to learn the basics or an experienced professional seeking to expand your knowledge, our tutorials cover a wide range of topics. Discover the fundamentals of communication skills, information systems security, network design & administration, secure software engineering, network security, and cryptography. Our tutorials are designed to be accessible and engaging, offering clear explanations and practical examples. Stay up-to-date with the latest trends and best practices in the ever-evolving field of cyber security. Our experienced instructors and industry experts ensure that the content is relevant and reflects the current landscape of threats and countermeasures. Take advantage of our comprehensive resources to enhance your skills, gain confidence, and advance your career in the exciting world of cyber security. Join us on this educational journey and empower yourself to protect digital systems, secure sensitive information, and contribute to a safer online environment. Start exploring our tutorials today and unlock the potential of cyber security expertise at Kapasa Makasa University!"

Learn more about us

Cyber Students 2023

Mary Chanda studying in the KMU Library

Network Security

OSI Reference Model

The Open Systems Interconnection model (OSI Model) was first introduced in the late 1970s. It is a reference model for designing a network architecture that is robust and flexible. It is a universally accepted model which describes the communication of various applications over the internet.

The OSI Model is divided into 7 layers: In order to reduce the design complexity, networks are organized as stacks of layers and levels. Each layer has its own set of functions which aids in the successful transfer of data. Each layer passes the data to the layer immediately below or above it.

The Layers are as follows:

  1. Application Layer – It consists of application layer protocol that allows network applications to work correctly in the network
  2. Presentation Layer – It receives the data from the application layer and is responsible for Translation, Data Compression, and Encryption/Decryption of the data
  3. Session Layer – It is responsible for setting up and managing connections. Its functions include Authentication, Authorization, and Session Restoration
  4. Transport Layer – It receives the data from the Session Layer. It is responsible for the delivery of a message from one process to another. It controls the reliability of communication through flow control, error control, and segmentation. It has two protocols namely TCP and UDP
  5. Network Layer – It is responsible for the transmission of data segments from one computer to another located in different networks
  6. Data Link Layer – Responsible for moving frames from one hop to another
  7. Physical Layer – It is responsible for converting the binary bits into signals and transmitting over local media

TCP/IP Reference Model

The layers in the TCP/IP protocol suite do not exactly match those in the OSI model. The original TCP/IP protocol suite was defined as having four layers: host to network, internet, transport, and application. TCP/IP Reference Model is the practical implementation of the theoretical OSI Model.

Transport Layer: The layer below the Session Layer is called the Transport Layer. The Data in this layer is called a segment. It is responsible for the delivery of a message from one process to another. It is also responsible for reliable communication through flow control, error control, and segmentation. Some of the most important protocols are Transmission Control Protocol (TCP) and User Datagram Protocol (UDP).

Transmission Control Protocol (TCP): It is a connection-oriented protocol that is used for the reliable transfer of data from one process to another process. It takes the help of the Port numbers for transmission. It uses flow control and error control mechanisms at the transport level. There are three phases in which TCP transmits the data between the sender and receiver: Connection Establishment, Data transfer, and Connection termination.

User Datagram Protocol (UDP): It is a transport layer protocol. It is an unreliable and connectionless protocol. It is much faster, simpler, and efficient than TCP. However, it doesn’t check errors due to which Bandwidth is saved. It is widely used in real-time services like video game, voice, or video communication.

Real-Life Examples of TCP

Real-Life Examples of UDP

Cryptography

Information Systems Security

Network Design and administration

Secure Software Engineering

Communication Skills

About Us

Mission

"Our mission is to provide comprehensive and accessible cyber security tutorials that empower individuals to develop a strong understanding of cyber security concepts, techniques, and best practices. We aim to equip learners with the knowledge and skills needed to navigate the ever-evolving landscape of digital threats and protect critical information systems. Through our tutorials, we strive to foster a culture of cyber security awareness and promote the importance of secure practices in an increasingly interconnected world. We are dedicated to delivering high-quality educational resources that enable individuals to enhance their cyber security expertise and contribute to creating a safer digital environment for all."

Vision

"Our vision is to become a globally recognized and trusted resource for cyber security education. We aspire to be at the forefront of cyber security knowledge dissemination, offering cutting-edge tutorials and resources that meet the evolving needs of learners in the digital age. We aim to empower individuals with the skills and expertise to proactively identify and mitigate cyber threats, ensuring the security and privacy of digital systems and data. Through our commitment to excellence, innovation, and continuous improvement, we envision being a catalyst for positive change in the field of cyber security, producing skilled professionals who can safeguard critical information infrastructure and contribute to a secure digital future."

Tap on the WhatsApp icon below to join