This topic is a deep-dive in the Network Address Translation, Port Address Translation and Proxying. Some security is provided by limiting our public-facing IP space. By using NAT and/or proxy server techniques, we can mask the IP of our internal user.
Define the terminology used in cybersecurity, discuss the enumeration methodology, perform network discovery, and discuss network traffic analysis methods. There will be a review and explanation of the impacts of cyber incidents on critical infrastructure.