THE PERFECT $10 SALE IS FINALLY HERE! Avail upto 90% OFFView Offer
  • Sign In
  • Registration

Discuss Network Security, Firewalls, & Learn The Best Password Managers On The Market

Become a Cyber Security Specialist and Learn Network Hacking Techniques

Price : $45.00 $50.00

Coming Soon
Wishlist
Compare

15-Days

Money Back

Access

lifetime

12.5

Hours

Over this course you’ll learn network hacking techniques and vulnerability scanning to discover security risks across an entire network, learning skills for which companies are willing to pay top dollar. Whether you want to protect your own network or protect corporate networks professionally, this course will get you up to speed.

  • Access 106 lectures & 12.5 hours of content 24/7
  • Architect your network for maximum security & prevent local & remote attacks
  • Understand the various types of firewalls available, including layer 4 firewalls like Iptables & PF
  • Discuss firewalls on all platforms, including Windows, Mac OS, & Linux
  • Explore wireless security & learn how WiFi is hacked
  • Use tools like Wireshark, Tcpdump, & Syslog to monitor your network
  • Dive into search engine privacy & tracking, learning how to mitigate tracking & privacy issues

 

    Rating 4.5 (50 Reviews)

Course Outline
  • Section: 1 Introduction
    • Welcome to Volume 2
    • Introduction to the Instructor!
    • Security Quick Win!
    • Target Audience 
    • Study Recommendations
    • Course updates
  • Section: 2 Goals and Learning Objectives - Volume 2
    • Goals and Learning Objectives - Volume 2
  • Section: 3 Routers - Port and Vulnerability scanning
    • Goals and Learning Objectives 
    • The Home Router
    • External Vulnerability Scanning - Shodan, Qualys & Nmap
    • Internal Vulnerability Scanning - MBSA, Nmap, Nessus, Fing & Superscan & OpenVAS 
    • Open Source Custom Router Firmware 
  • Section: 4 Firewalls
    • Goals and Learning Objectives
    • Firewalls – Host-based, network-based and virtual Part 1
    • Firewalls – Host-based, network-based and virtual Part 2
    • Windows - Host Based Firewalls - Windows Firewall
    • Windows - Host Based Firewalls - Windows Firewall Control (WFC)
    • Windows - Host Based Firewalls - Third Party 
    • Linux - Host Based Firewalls - iptables 
    • Linux - Host Based Firewalls - UFW, gufw & nftables
    • Mac OS X - Host based Firewalls - Application Firewall & PF 
    • Mac OS X - Host based Firewalls - pflist, Icefloor & Murus
    • Mac OS X - Host based Firewalls - Little Snitch 
    • Network based firewalls - Routers - DD-WRT
    • Network based firewalls - Hardware
    • Network based firewalls - PFsence, Smoothwall and Vyos
  • Section: 5 Network Attacks, Architecture and Isolation
    • Goals and Learning Objectives
    • Network Attacks and Network Isolation - Introduction and IOT
    • Network Attacks and Network Isolation - Arp Spoofing and Switches
    • Effective Network Isolation Part 1
    • Effective Network Isolation Part 2
  • Section: 6 Wireless and Wi-Fi Security
    • Goals and Learning Objectives
    • Wi-Fi Weaknesses - WEP
    • Wi-Fi Weaknesses - WPA, WPA2, TKIP and CCMP 
    • Wi-Fi Weaknesses - Wi-Fi Protected Setup WPS, Evil Twin and Rouge AP
    • Wi-Fi Security Testing
    • Wireless Security - Secure Configuration and Network Isolation 
    • Wireless security - RF Isolation and Reduction 
    • Wireless security - Who is on my Wi-Fi Network?
  • Section: 7 Network Monitoring for Threats
    • Goals and Learning Objectives
    • Syslog
    • Network Monitoring - Wireshark, tcpdump, tshark, iptables Part 1 
    • Network Monitoring - Wireshark, tcpdump, tshark, iptables Part 2
    • Wireshark - Finding malware and hackers - Part 1
    • Wireshark - Finding malware and hackers - Part 2
    • Network Monitoring - Wincap, NST, Netminer and NetWorx
  • Section: 8 How We Are Tracked Online
    • Goals and Learning Objectives
    • Types of Tracking
    • IP Address
    • 3rd Party Connections
    • HTTP Referer
    • Cookies and Scripts
    • Super Cookies 
    • Browser Fingerprinting and Browser Volunteered Information
    • Browser and Browser Functionality
    • More Tracking
    • Browser and Internet Profiling
  • Section: 9 Search Engines and Privacy
    • Goals and Learning Objectives
    • Search Engine Tracking, Censorship and Privacy
    • Ixquick and Startpage
    • DuckDuckGo
    • Disconnect search 
    • Yacy 
    • Private and Anonymous Searching
  • Section: 10 Browser Security and Tracking Prevention
    • Goals and Learning Objectives
    • Which Browser – Choice of Browser 
    • Reducing the Browser Attack Surface
    • Browser Hacking Demo)
    • Browser Isolation and Compartmentalization
    • Firefox Security, Privacy and Tracking
    • uBlock origin - HTTP Filters, ad and track blockers
    • uMatrix - HTTP Filters, ad and track blockers
    • Disconnect, Ghostery, Request policy - HTTP Filters, ad and track blockers
    • ABP, Privacy badger, WOT - HTTP Filters, ad and track blockers
    • No-script - HTTP Filters, ad and track blockers 
    • Policeman and others - HTTP Filters, ad and track blockers
    • History, Cookies and Super cookies Part 1
    • History, Cookies and Super cookies Part 2
    • HTTP Referer (2:19)
    • Browser Fingerprinting 
    • Certificates and Encryption
    • Firefox Hardening
  • Section: 11 Passwords and Authentication Methods
    • Goals and Learning Objectives
    • Password Attacks
    • How Passwords are Cracked - Hashes - Part 1 
    • How Passwords are Cracked - Hashcat - Part 2
    • Operating System Passwords
    • Password Managers - An Introduction
    • Password Managers - Master Password
    • Password Managers - Keepass and Keepassx 
    • Password Managers - Lastpass
    • Password Managers - Hardening Lastpass 
    • Creating a Strong Password That You Can Remember - Part 1 
    • Creating a Strong Password That You Can Remember - Part 2
    • Multi-Factor Authentication - Soft Tokens - Google Authenticator and Authy
    • Multi-Factor Authentication - Hard Tokens - 2FA Dongles 
    • Choosing a Method of Multi-Factor Authentication
    • Multi-Factor Authentication - Strengths and Weaknesses
    • The Future of Password and Authentication
  • Section: 12 BONUS Section... Whats Next?...Volume 3 and 4
    • BONUS - Important Information
    • BONUS Lecture from Volume 3 - Which VPN protocol is best to use? and why? 
    • BONUS Lecture from Volume 4 - Email Tracking and Hacking
    • BONUS Lecture from Volume 1 - Security Vulnerabilities, Threats and Adversaries

//