From eefcc6866b96236574a29814cfeaf23700e38eba Mon Sep 17 00:00:00 2001 From: roadmap bot <135830415+roadmap-bot@users.noreply.github.com> Date: Wed, 5 Jul 2023 22:07:17 +0100 Subject: [PATCH] chore: add resource under cyber-security:networking-knowledge:osi-model --- .../content/102-networking-knowledge/100-osi-model.md | 2 ++ 1 file changed, 2 insertions(+) diff --git a/src/data/roadmaps/cyber-security/content/102-networking-knowledge/100-osi-model.md b/src/data/roadmaps/cyber-security/content/102-networking-knowledge/100-osi-model.md index 05e013cdf..041207cf3 100644 --- a/src/data/roadmaps/cyber-security/content/102-networking-knowledge/100-osi-model.md +++ b/src/data/roadmaps/cyber-security/content/102-networking-knowledge/100-osi-model.md @@ -35,3 +35,5 @@ The **Application layer** is the interface between the user and the communicatio Each of these layers interacts with the adjacent layers to pass data packets back and forth. Understanding the OCI model is crucial for addressing potential security threats and vulnerabilities that can occur at each layer. By implementing strong network security measures at each layer, you can minimize the risk of cyber attacks and keep your data safe. In the next section, we will discuss network protocols and how they play an essential role in network communication and security. + +- [What is OSI Model?](https://www.youtube.com/watch?v=Ilk7UXzV_Qc&ab_channel=RealPars) \ No newline at end of file