The Complete Cyber Security Course! Volume 2 : Network Security

Course

Online

£ 10 + VAT

Description

  • Type

    Course

  • Methodology

    Online

  • Start date

    Different dates available

After this course, you will be able to discover security vulnerabilities across an entire network, by using network hacking techniques and vulnerability scanning .You will be able to architect your network for maximum security and prevent local and remote attacks. We also cover the use of custom router firmware to provide you with better network security services.You will understand the various types of firewalls that are available and what threats each help mitigate.Including layer 4 firewalls like Iptables on Linux and PF on MacOS and BSD. Virtual firewalls, host-based firewalls and application based firewalls like Pfsence. We cover firewalls on all platforms including Windows, Mac OS X and Linux for all types of use scenarios.We explore in detail wireless security, the configurations that are required for maximum security and why. How Wi-Fi is hacked and how to mitigate those attacks. Covering everything from encryption weaknesses to evil twins, RF isolation, and Wi-Fi crackers.You will master network monitoring to discover and identify potential hackers, malware and other adversaries that might be lurking on your network. Using tools like Wireshark, Tcpdump and Syslog.We then move away from network security and onto the details of how we are tracked online by corporations, nation-states your ISP and others. You will understand the techniques used like zombie super cookies, browser fingerprinting and how browser profiling works so third parties can establish who you are online.We look at search engine privacy - and how to mitigate the tracking and privacy issues of search engines and their associated services.Browser security - We cover one of the largest risks online, the browser. The doorway into your system. How to best reduce the attack surface of the browser and harden it for maximum security and privacy. A critical consideration for reducing your risk.

Facilities

Location

Start date

Online

Start date

Different dates availableEnrolment now open

About this course

An advanced practical skill-set in assuring network security against all threats including - advanced hackers, trackers, exploit kits, Wi-Fi attacks and much more
In this volume, we take a detailed look at network security
The very latest up-to-date information and methods
Discover security vulnerabilities across an entire network, by using network hacking techniques and vulnerability scanning
You will be able to configure firewalls on all platforms including Windows, MacOS, and Linux for all types of attack scenarios
Learn to configure and architect a small network for maximum physical and wireless security
Perform network monitoring to discover and identify potential hackers and malware using tools like Wireshark, Tcpdump, and Syslog
Understand how we are tracked online by corporations, nation-states your ISP and others
We look at search engine privacy - we will best understand how to mitigate the tracking and privacy issues of search engines and their associated services
Understand how to best use methods of authentication including passwords, multi-factor authentication including soft tokens and hard tokens
What are the best password managers to use and why. How passwords are cracked, and how to mitigate the password attacks

Questions & Answers

Add your question

Our advisors and other users will be able to reply to you

Who would you like to address this question to?

Fill in your details to get a reply

We will only publish your name and question

Emagister S.L. (data controller) will process your data to carry out promotional activities (via email and/or phone), publish reviews, or manage incidents. You can learn about your rights and manage your preferences in the privacy policy.

Reviews

This centre's achievements

2021

All courses are up to date

The average rating is higher than 3.7

More than 50 reviews in the last 12 months

This centre has featured on Emagister for 6 years

Subjects

  • Mac
  • Network Training
  • Mac-OS
  • Mac OS
  • Router
  • Firewall
  • Network security
  • Network
  • Linux
  • Windows

Course programme

Introduction 7 lectures 23:29 1. Welcome to Volume 2 Welcome to the course. This is Volume 2 of Complete Cyber Security Course. 2. Introduction to the Instructor! Introduction to your instructor on this course. 3. Security Quick Win! How to achieve a quick security win! 4. Target Audience Who is the target audience for this course? 5. Study Recommendations Study recommendations. 6. The Forum - For Questions, Answers and Other Resources The support forum - for questions, answers and other resources. 7. Course updates Course updates. Introduction 7 lectures 23:29 1. Welcome to Volume 2 Welcome to the course. This is Volume 2 of Complete Cyber Security Course. 2. Introduction to the Instructor! Introduction to your instructor on this course. 3. Security Quick Win! How to achieve a quick security win! 4. Target Audience Who is the target audience for this course? 5. Study Recommendations Study recommendations. 6. The Forum - For Questions, Answers and Other Resources The support forum - for questions, answers and other resources. 7. Course updates Course updates. 1. Welcome to Volume 2 Welcome to the course. This is Volume 2 of Complete Cyber Security Course. 1. Welcome to Volume 2 Welcome to the course. This is Volume 2 of Complete Cyber Security Course. 1. Welcome to Volume 2 Welcome to the course. This is Volume 2 of Complete Cyber Security Course. 1. Welcome to Volume 2 Welcome to the course. This is Volume 2 of Complete Cyber Security Course. Welcome to the course. This is Volume 2 of Complete Cyber Security Course. Welcome to the course. This is Volume 2 of Complete Cyber Security Course. 2. Introduction to the Instructor! Introduction to your instructor on this course. 2. Introduction to the Instructor! Introduction to your instructor on this course. 2. Introduction to the Instructor! Introduction to your instructor on this course. 2. Introduction to the Instructor! Introduction to your instructor on this course. Introduction to your instructor on this course. Introduction to your instructor on this course. 3. Security Quick Win! How to achieve a quick security win! 3. Security Quick Win! How to achieve a quick security win! 3. Security Quick Win! How to achieve a quick security win! 3. Security Quick Win! How to achieve a quick security win! How to achieve a quick security win! How to achieve a quick security win! 4. Target Audience Who is the target audience for this course? 4. Target Audience Who is the target audience for this course? 4. Target Audience Who is the target audience for this course? 4. Target Audience Who is the target audience for this course? Who is the target audience for this course? Who is the target audience for this course? 5. Study Recommendations Study recommendations. 5. Study Recommendations Study recommendations. 5. Study Recommendations Study recommendations. 5. Study Recommendations Study recommendations. Study recommendations. Study recommendations. 6. The Forum - For Questions, Answers and Other Resources The support forum - for questions, answers and other resources. 6. The Forum - For Questions, Answers and Other Resources The support forum - for questions, answers and other resources. 6. The Forum - For Questions, Answers and Other Resources The support forum - for questions, answers and other resources. 6. The Forum - For Questions, Answers and Other Resources The support forum - for questions, answers and other resources. The support forum - for questions, answers and other resources. The support forum - for questions, answers and other resources. 7. Course updates Course updates. 7. Course updates Course updates. 7. Course updates Course updates. 7. Course updates Course updates. Course updates. Course updates. Goals and Learning Objectives - Volume 2 1 lecture 03:09 8. Goals and Learning Objectives - Volume 2 Goals and learning objectives for this course. Goals and Learning Objectives - Volume 2 1 lecture 03:09 8. Goals and Learning Objectives - Volume 2 Goals and learning objectives for this course. 8. Goals and Learning Objectives - Volume 2 Goals and learning objectives for this course. 8. Goals and Learning Objectives - Volume 2 Goals and learning objectives for this course. 8. Goals and Learning Objectives - Volume 2 Goals and learning objectives for this course. 8. Goals and Learning Objectives - Volume 2 Goals and learning objectives for this course. Goals and learning objectives for this course. Goals and learning objectives for this course. Routers - Port and Vulnerability Scanning 5 lectures 01:01:46 9. Goals and Learning Objectives Golas and learning objectives for this session. 10. The Home Router Home routers. 11. External Vulnerability Scanning - Shodan, Qualys & Nmap How to scan for external vulnerability using Shodan, Qualys & Nmap. 12. Internal Vulnerability Scanning - MBSA, Nmap, Nessus, Fing & Superscan & Ope How to scan for internal vulnerability using MBSA, Nmap, Nessus, Fing & Superscan & Ope. 13. Open Source Custom Router Firmware Using open source custom router firmware. Routers - Port and Vulnerability Scanning 5 lectures 01:01:46 9. Goals and Learning Objectives Golas and learning objectives for this session. 10. The Home Router Home routers. 11. External Vulnerability Scanning - Shodan, Qualys & Nmap How to scan for external vulnerability using Shodan, Qualys & Nmap. 12. Internal Vulnerability Scanning - MBSA, Nmap, Nessus, Fing & Superscan & Ope How to scan for internal vulnerability using MBSA, Nmap, Nessus, Fing & Superscan & Ope. 13. Open Source Custom Router Firmware Using open source custom router firmware. 9. Goals and Learning Objectives Golas and learning objectives for this session. 9. Goals and Learning Objectives Golas and learning objectives for this session. 9. Goals and Learning Objectives Golas and learning objectives for this session. 9. Goals and Learning Objectives Golas and learning objectives for this session. Golas and learning objectives for this session. Golas and learning objectives for this session. 10. The Home Router Home routers. 10. The Home Router Home routers. 10. The Home Router Home routers. 10. The Home Router Home routers. Home routers. Home routers. 11. External Vulnerability Scanning - Shodan, Qualys & Nmap How to scan for external vulnerability using Shodan, Qualys & Nmap. 11. External Vulnerability Scanning - Shodan, Qualys & Nmap How to scan for external vulnerability using Shodan, Qualys & Nmap. 11. External Vulnerability Scanning - Shodan, Qualys & Nmap How to scan for external vulnerability using Shodan, Qualys & Nmap. 11. External Vulnerability Scanning - Shodan, Qualys & Nmap How to scan for external vulnerability using Shodan, Qualys & Nmap. How to scan for external vulnerability using Shodan, Qualys & Nmap. How to scan for external vulnerability using Shodan, Qualys & Nmap. 12. Internal Vulnerability Scanning - MBSA, Nmap, Nessus, Fing & Superscan & Ope How to scan for internal vulnerability using MBSA, Nmap, Nessus, Fing & Superscan & Ope. 12. Internal Vulnerability Scanning - MBSA, Nmap, Nessus, Fing & Superscan & Ope How to scan for internal vulnerability using MBSA, Nmap, Nessus, Fing & Superscan & Ope. 12. Internal Vulnerability Scanning - MBSA, Nmap, Nessus, Fing & Superscan & Ope How to scan for internal vulnerability using MBSA, Nmap, Nessus, Fing & Superscan & Ope. 12. Internal Vulnerability Scanning - MBSA, Nmap, Nessus, Fing & Superscan & Ope How to scan for internal vulnerability using MBSA, Nmap, Nessus, Fing & Superscan & Ope. How to scan for internal vulnerability using MBSA, Nmap, Nessus, Fing & Superscan & Ope. How to scan for internal vulnerability using MBSA, Nmap, Nessus, Fing & Superscan & Ope. 13. Open Source Custom Router Firmware Using open source custom router firmware. 13. Open Source Custom Router Firmware Using open source custom router firmware. 13. Open Source Custom Router Firmware Using open source custom router firmware. 13. Open Source Custom Router Firmware Using open source custom router firmware. Using open source custom router firmware. Using open source custom router firmware. Firewalls. 14 lectures 02:03:17 14. Goals and Learning Objectives Goals and learning objectives for this session. 15. Firewalls – Host-based, Network-based and Virtual Part 1 Firewalls – Host-based, Network-based and Virtual. 16. Firewalls – Host-based, Network-based and Virtual Part 2 Firewalls – Host-based, Network-based and Virtual. 17. Windows - Host Based Firewalls - Windows Firewall Windows based firewalls - Windows Firewall. 18. Windows - Host Based Firewalls - Windows Firewall Control (WFC) Windows based firewalls - Windows Firewall Control (WFC) 19. Windows - Host Based Firewalls - Third Party Windows based firewalls - Third Party, Comodo, Tinywall, Private, glasswire. 20. Linux - Host Based Firewalls - iptables Linux based firewalls with iptables. 21. Linux - Host Based Firewalls - UFW, gufw & nftables Linux based firewalls with UFW, gufw & nftables. 22. Mac OS X - Host based Firewalls - Application Firewall & PF Mac based firewalls with Application Firewall & PF. 23. Mac OS X - Host based Firewalls - pflist, Icefloor & Murus Mac based firewalls with pflist, Icefloor & Murus. 24. Mac OS X - Host based Firewalls - Little Snitch Mac based firewalls with Little Snitch. 25. Network based firewalls - Routers - DD-WRT Network based firewalls - Routers - DD-WRT. 26 /p...

Additional information

This course is designed for personal and home cyber security, privacy and anonymity. Most of the topics apply in the same way to a business, but the course is delivered as if to an individual for personal cyber security, privacy, and anonymity It is recommended that you watch volume 1 of this complete course before watching this volume (2) although it is not required You can take this volume as a stand-alone course You should have a basic understanding of networking concepts Please note this is volume 2 of 4 of the complete course. After the completion of all 4 volumes, you will know more than 80% of security professionals, government and law enforcement agents and even expert hackers about maintaining security, privacy, and anonymity

The Complete Cyber Security Course! Volume 2 : Network Security

£ 10 + VAT