-
Notifications
You must be signed in to change notification settings - Fork 0
/
index.html
209 lines (177 loc) · 14.1 KB
/
index.html
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
<!DOCTYPE html>
<html>
<head>
<title>KMU Cyber Security Tutorials</title>
<link rel="stylesheet" type="text/css" href="styles.css">
</head>
<body>
</head>
<body>
<header>
<nav>
<ul>
<li><a href="index.html">Home</a></li>
<li class="dropdown">
<a href="#">Courses</a>
<div class="dropdown-content">
<a href="#communication-skills">Communication Skills</a>
<a href="#information-systems-security">Information Systems Security</a>
<a href="#network-design-and-administration">Network Design & Administration</a>
<a href="#secure-software-engineering">Secure Software Engineering</a>
<a href="#network-security">Network Security</a>
<a href="#cryptography">Cryptography</a>
</div>
</li>
<li><a href="#about">About</a></li>
<li><a href="#contact">Contact</a></li>
</ul>
</nav>
</header>
<main>
<h1>KMU Cyber Security Tutorials</h1>
<section id="home">
<div class="feed-item">
<p>"Welcome to <b>Kapasa Makasa University</b> Cyber Security Tutorials! We are dedicated to providing high-quality educational resources and tutorials on all things related to <b>cyber security</b>. Whether you are a beginner looking to learn the basics or an experienced professional seeking to expand your knowledge, our tutorials cover a wide range of topics.
Discover the fundamentals of <i>communication skills</i>, <i>information systems security</i>, <i>network design & administration</i>, <i>secure software engineering</i>, <i>network security</i>, and <i>cryptography</i>. Our tutorials are designed to be accessible and engaging, offering clear explanations and practical examples.
Stay up-to-date with the latest trends and best practices in the ever-evolving field of cyber security. Our experienced instructors and industry experts ensure that the content is relevant and reflects the current landscape of threats and countermeasures.
Take advantage of our comprehensive resources to enhance your skills, gain confidence, and advance your career in the exciting world of <b>cyber security</b>. Join us on this educational journey and empower yourself to protect digital systems, secure sensitive information, and contribute to a safer online environment.
Start exploring our tutorials today and unlock the potential of cyber security expertise at <b>Kapasa Makasa University</b>!"</p>
<p><a href="#about">Learn more about us</a></p>
<img src="Cyber.jpg" alt="Cyber Students 2023">
</section>
<section id="feed">
<h2>Mary Chanda studying in the KMU Library</h2>
<div class="featured-picture">
<img src="image2.jpg" alt="students">
<h2>Jeff Sichilongo and Marry Chanda taking pics after class at K block classes</h2>
</div>
<div class="featured-picture">
<img src="image3.jpg" alt="students">
<h2>Nchimunya Faith Moono at the KMU Library</h2>
</div>
<div class="featured-picture">
<img src="image4.jpg" alt="students">
<img src="image6.jpg" alt="students">
<h2>George Mwape, Nchimunya Faith Moono, Tracy Tembo, and Jeff Sichilongo at LT2 after Cryptography presentations</h2>
</div>
<div class="featured-picture">
<img src="image5.jpg" alt="students">
</div>
</section>
</main>
<section id="network-security">
<h1>Network Security</h1>
<div class="youtube-video">
<iframe width="100%" height="500" src="https://www.youtube.com/embed/oQzueBVyAM4" frameborder="0" allowfullscreen></iframe>
</div>
<div class="youtube-video">
<iframe width="100%" height="500" src="https://www.youtube.com/embed/oQzueBVyAM4" frameborder="0" allowfullscreen></iframe>
</div>
<div class="youtube-video">
<iframe width="100%" height="500" src="https://www.youtube.com/embed/UG26SS9pjwE" frameborder="0" allowfullscreen></iframe>
</div>
<div class="youtube-video">
<iframe width="100%" height="500" src="https://www.youtube.com/embed/vet_27XOXbc" frameborder="0" allowfullscreen></iframe>
</div>
<div class="youtube-video">
<iframe width="100%" height="500" src="https://www.youtube.com/embed/eHV1aOnu7oM" frameborder="0" allowfullscreen></iframe>
</div>
<div class="youtube-video">
<iframe width="100%" height="500" src="https://www.youtube.com/embed/uyRtYUg6bnw" frameborder="0" allowfullscreen></iframe>
</div>
<div class="youtube-video">
<iframe width="100%" height="500" src="https://www.youtube.com/embed/EZTQ61njgKI" frameborder="0" allowfullscreen></iframe>
</div>
<div class="youtube-video">
<iframe width="100%" height="500" src="https://www.youtube.com/embed/R-JUOpCgTZc" frameborder="0" allowfullscreen></iframe>
</div>
<div class="youtube-video">
<iframe width="100%" height="500" src="https://www.youtube.com/embed/tapoOQ-MkPU" frameborder="0" allowfullscreen></iframe>
</div>
<div class="youtube-video">
<iframe width="100%" height="500" src="https://www.youtube.com/embed/fMJwzdKZPKw" frameborder="0" allowfullscreen></iframe>
</div>
<section id="lyrics">
<h2>OSI Reference Model</h2>
<p>The Open Systems Interconnection model (OSI Model) was first introduced in the late 1970s. It is a reference model for designing a network architecture that is robust and flexible. It is a universally accepted model which describes the communication of various applications over the internet.</p>
<p>The OSI Model is divided into 7 layers: In order to reduce the design complexity, networks are organized as stacks of layers and levels. Each layer has its own set of functions which aids in the successful transfer of data. Each layer passes the data to the layer immediately below or above it.</p>
<p>The Layers are as follows:</p>
<ol>
<li>Application Layer – It consists of application layer protocol that allows network applications to work correctly in the network</li>
<li>Presentation Layer – It receives the data from the application layer and is responsible for Translation, Data Compression, and Encryption/Decryption of the data</li>
<li>Session Layer – It is responsible for setting up and managing connections. Its functions include Authentication, Authorization, and Session Restoration</li>
<li>Transport Layer – It receives the data from the Session Layer. It is responsible for the delivery of a message from one process to another. It controls the reliability of communication through flow control, error control, and segmentation. It has two protocols namely TCP and UDP</li>
<li>Network Layer – It is responsible for the transmission of data segments from one computer to another located in different networks</li>
<li>Data Link Layer – Responsible for moving frames from one hop to another</li>
<li>Physical Layer – It is responsible for converting the binary bits into signals and transmitting over local media</li>
</ol>
</section>
<section id="tcpip">
<h2>TCP/IP Reference Model</h2>
<p>The layers in the TCP/IP protocol suite do not exactly match those in the OSI model. The original TCP/IP protocol suite was defined as having four layers: host to network, internet, transport, and application. TCP/IP Reference Model is the practical implementation of the theoretical OSI Model.</p>
<p>Transport Layer: The layer below the Session Layer is called the Transport Layer. The Data in this layer is called a segment. It is responsible for the delivery of a message from one process to another. It is also responsible for reliable communication through flow control, error control, and segmentation. Some of the most important protocols are Transmission Control Protocol (TCP) and User Datagram Protocol (UDP).</p>
<p>Transmission Control Protocol (TCP): It is a connection-oriented protocol that is used for the reliable transfer of data from one process to another process. It takes the help of the Port numbers for transmission. It uses flow control and error control mechanisms at the transport level. There are three phases in which TCP transmits the data between the sender and receiver: Connection Establishment, Data transfer, and Connection termination.</p>
<p>User Datagram Protocol (UDP): It is a transport layer protocol. It is an unreliable and connectionless protocol. It is much faster, simpler, and efficient than TCP. However, it doesn’t check errors due to which Bandwidth is saved. It is widely used in real-time services like video game, voice, or video communication.</p>
</section>
<section id="tcp-examples">
<h2>Real-Life Examples of TCP</h2>
<ul>
<li>Text Communication – We all are aware of the importance of Text Communication in the present times. Any discrepancy in texting between sender and receiver cannot be tolerated. Hence TCP is used in Text Communication due to its reliable transmission, error control, and in order receiving of the data. Example: Whatsapp, Instagram, Google Chat, iMessage.</li>
<li>Transfer of files or FTP – TCP is used in File transfer when we cannot tolerate the loss of data and receiving the data in incorrect order is of utmost importance. FTP uses two TCP connections: control connection and data connection. Control Connection: FTP sends information like user identification and passwords. Data Connection: In this connection, files are sent over the network. Example: FileZilla Client and Server.</li>
<li>HyperText Transfer Protocol (HTTP) – It is used to access the data present on the World Wide Web. It uses TCP protocol for accessing the web pages present on the internet due to the fact that TCP provides in order data, error control, and flow control, and retransmission of data segments.</li>
<li>Simple Mail Transfer Protocol (SMTP) – It is an application layer protocol that is used to send Emails from one system to another. SMTP uses the services of TCP to start a connection with the SMTP server. Once the SMTP server accepts the connection request, it allows the sender to send the mails. Example: Yahoo, Gmail, Outlook, etc.</li>
</ul>
</section>
<section id="udp-examples">
<h2>Real-Life Examples of UDP</h2>
<ul>
<li>Online Games – Most of the online games we play use the services of User Datagram Protocol. Since any amount of delay cannot be tolerated in online games, UDP is widely used over TCP, which is quite slower. UDP doesn’t retransmit the lost data and is a connectionless protocol due to which it is much faster. Example: All online games.</li>
<li>Video Conferencing – Video Conferencing apps like Skype, Gmeet, Zoom, all use the services of UDP due to the fact that they are real-time applications and any delay in receiving the data cannot be tolerated. Example: Skype, Google Meet, Zoom, and Facetime.</li>
<li>Voice Over IP (VoIP) – It is similar to Video Conferencing, where apps like Viber, Whatsapp, Google Hangouts use UDP for converting our voice to digital data and transmit it over the network, hence the name VoIP. Example: Viber, Whatsapp Voice calling, Wi-Fi calling.</li>
<li>Domain Name System (DNS) – It is a service used for mapping domain names to their corresponding IP address. It is used by the application layer. DNS uses UDP for fetching the corresponding IP address due to its speed and small request sizes. Example: DNS lookup requests.</li>
</ul>
</section>
</div>
</div>
</section>
</main>
<section id="cryptography">
<h1>Cryptography</h1>
</main>
<section id="information-systems-security">
<h1>Information Systems Security</h1>
</main>
<section id="network-design-and-administration">
<h1>Network Design and administration</h1>
</main>
<section id="secure-software-engineering">
<h1>Secure Software Engineering</h1>
</main>
<section id="communication-skills">
<h1>Communication Skills</h1>
<main>
<section id="about">
<h2>About Us</h2>
<div class="about-tabs">
<button class="tablink" onclick="openTab(event, 'session1')">Mission</button>
<button class="tablink" onclick="openTab(event, 'session2')">Vision</button>
<button class="tablink" onclick="openTab(event, 'session3')">WhatsApp</button>
<div id="session1" class="tabcontent">
<h2>Mission</h2>
<p>"Our mission is to provide comprehensive and accessible cyber security tutorials that empower individuals to develop a strong understanding of cyber security concepts, techniques, and best practices. We aim to equip learners with the knowledge and skills needed to navigate the ever-evolving landscape of digital threats and protect critical information systems. Through our tutorials, we strive to foster a culture of cyber security awareness and promote the importance of secure practices in an increasingly interconnected world. We are dedicated to delivering high-quality educational resources that enable individuals to enhance their cyber security expertise and contribute to creating a safer digital environment for all."</p>
</div>
<div id="session2" class="tabcontent">
<h2>Vision</h2>
<p>"Our vision is to become a globally recognized and trusted resource for cyber security education. We aspire to be at the forefront of cyber security knowledge dissemination, offering cutting-edge tutorials and resources that meet the evolving needs of learners in the digital age. We aim to empower individuals with the skills and expertise to proactively identify and mitigate cyber threats, ensuring the security and privacy of digital systems and data. Through our commitment to excellence, innovation, and continuous improvement, we envision being a catalyst for positive change in the field of cyber security, producing skilled professionals who can safeguard critical information infrastructure and contribute to a secure digital future."</p>
</div>
<div id="session3" class="tabcontent">
<h2>Tap on the WhatsApp icon below to join</h2>
<ul class="social-media-links">
<li><a href="https://chat.whatsapp.com/LPBuurTnibBEOzHjOAjhkV"><img src="whatsapp.png" alt="WhatsApp"></a></li>
</div>
</div>
</section>
</main>
<footer>
<p>© 2023 KMU Cyber Security Tutorials. All rights reserved.</p>
</footer>