Curriculum
Course: Cyber Security
Login

Curriculum

Cyber Security

Text lesson

The OSI Model

The top three layers are usually implemented in software as part of the Operating System.

Layer

Where it is implemented

7 – Application

Software

6 – Presentation

Software

5 – Session

Software

The bottom three layers are usually implemented in hardware within network devices, such as switches, routers, and firewalls.

Layer

Where it is implemented

3 – Network Layer

Hardware

2 – Data Link

Hardware

1 – Physical

Hardware