Hi what does he mean by lots of money with little education at the
presentation layer?? then the tutor says Security certifications, those are
hard to get ..lots of reading..u need to know linux and more ....
+Beach Samurai because a lot of cybersecurity personnel are usually trained in vocational schools (i.e. trade schools, military, etc) or other certification programs. That's not a huge investment in time when you compare that to people who get a bachelors or masters in CS. But despite that the money is very good for people who do manage to get into it.
In the late 1970s, two projects began independently, with the same goal: to define a unifying standard for the architecture of networking systems. One was ...
OSI Reference Model in Malayalam
The OSI model defines a networking framework to implement protocols in seven layers,It is now considered the primary Architectural model for inter-computer ...
Open system interconnect(OSI model) Lecture by Mrs. Deepika Shrivastava.
OSI is a seven layered architecture used to establish communication between 2 systems which have nothing in common like they are in different networks, ...
Total Lecture is wrong why .... she has to come from application layer
which will help students to better understand. For example Physical-bit
stream ... where this bits will come .... see below video
+Eric L Hicks, yes, the process starts with encapsulation of data followed by de-capsulation of data. The communication is two way process. She should start with application layer first.