Network Security

Volume 2 : Network Security, WiFi Security, WiFi Hackers, Firewalls, Wireshark, Secure Networking. + Password Managers

Last updated 2022-01-10 | 4.5

- An advanced practical skill-set in assuring network security against all threats including - advanced hackers
- trackers
- exploit kits
- Wi-Fi attacks and much more.
- In this volume
- we take a detailed look at network security.
- Start a career in cyber security. Become a cyber security specialist.

What you'll learn

An advanced practical skill-set in assuring network security against all threats including - advanced hackers
trackers
exploit kits
Wi-Fi attacks and much more.
In this volume
we take a detailed look at network security.
Start a career in cyber security. Become a cyber security specialist.
The very latest up-to-date information and methods.
Discover security vulnerabilities across an entire network
by using network hacking techniques and vulnerability scanning.
You will be able to configure firewalls on all platforms including Windows
MacOS
and Linux for all types of attack scenarios.
Learn to configure and architect a small network for maximum physical and wireless security.
Perform network monitoring to discover and identify potential hackers and malware using tools like Wireshark
Tcpdump
and Syslog.
Understand how we are tracked online by corporations
nation-states your ISP and others.
We look at search engine privacy - we will best understand how to mitigate the tracking and privacy issues of search engines and their associated services.
Understand how to best use methods of authentication including passwords
multi-factor authentication including soft tokens and hard tokens.
What are the best password managers to use and why. How passwords are cracked
and how to mitigate the password attacks.
A certificate of completion is available signed by the instructor Nathan House so CPE credits can be claimed. An off-site sign-up is required to provide your details for this optional certificate.

* Requirements

* This course is designed for personal and home cyber security
* privacy and anonymity. Most of the topics apply in the same way to a business
* but the course is delivered as if to an individual for personal cyber security
* privacy
* and anonymity.
* It is recommended that you watch volume 1 of this complete course before watching this volume (2) although it is not required.
* Most items referenced in this course are free. But you may elect to purchase additional software
* hardware and services discussed in the course. Although It is absolutely not necessary to buy anything to understand and follow the course.
* You should have a basic understanding of networking concepts.
* Please note this is volume 2 of 4 of the complete course. After the completion of all 4 volumes
* you will know more than 80% of security professionals
* government and law enforcement agents and even expert hackers about maintaining security
* privacy
* and anonymity.

Description

  • An advanced practical skill-set in assuring network security against all threats including - advanced hackers, trackers, exploit kits, Wi-Fi attacks and much more.
  • In this volume, we take a detailed look at network security.
  • Start a career in cyber security. Become a cyber security specialist.
  • The very latest up-to-date information and methods.
  • Discover security vulnerabilities across an entire network, by using network hacking techniques and vulnerability scanning.
  • You will be able to configure firewalls on all platforms including Windows, MacOS, and Linux for all types of attack scenarios.
  • Learn to configure and architect a small network for maximum physical and wireless security.
  • Perform network monitoring to discover and identify potential hackers and malware using tools like Wireshark, Tcpdump, and Syslog.
  • Understand how we are tracked online by corporations, nation-states your ISP and others.
  • We look at search engine privacy - we will best understand how to mitigate the tracking and privacy issues of search engines and their associated services.
  • Understand how to best use methods of authentication including passwords, multi-factor authentication including soft tokens and hard tokens.
  • What are the best password managers to use and why. How passwords are cracked, and how to mitigate the password attacks.
  • A certificate of completion is available signed by the instructor Nathan House so CPE credits can be claimed. An off-site sign-up is required to provide your details for this optional certificate.

Course content

13 sections • 106 lectures

Welcome to Volume 2 Preview 00:34

Introduction to the Instructor! Preview 02:06

Security Quick Win! Preview 11:23

Target Audience Preview 01:54

Study Recommendations Preview 04:19

Course updates Preview 00:40

Cyber Security and Ethical Hacking Careers Preview 03:45

How to start a career in cyber security and ethical hacking.

Goals and Learning Objectives Preview 00:28

The Home Router Preview 13:44

External Vulnerability Scanning - Shodan, Qualys & Nmap Preview 16:23

Internal Vulnerability Scanning - MBSA, Nmap, Nessus, Fing & Superscan & OpenVAS Preview 19:33

Open Source Custom Router Firmware Preview 11:37

Goals and Learning Objectives Preview 00:25

Firewalls – Host-based, network-based and virtual Part 1 Preview 14:48

Firewalls – Host-based, network-based and virtual Part 2 Preview 04:54

Windows - Host Based Firewalls - Windows Firewall Preview 10:29

Windows - Host Based Firewalls - Windows Firewall Control (WFC) Preview 05:18

Windows - Host Based Firewalls - Third Party Preview 08:45

Linux - Host Based Firewalls - iptables Preview 19:58

Linux - Host Based Firewalls - UFW, gufw & nftables Preview 12:07

Mac - Host based Firewalls - Application Firewall & PF Preview 13:52

Mac - Host based Firewalls - pflist, Icefloor & Murus Preview 07:47

Mac - Host based Firewalls - Little Snitch Preview 06:22

Network based firewalls - Routers - DD-WRT Preview 05:09

Network based firewalls - Hardware Preview 02:43

Network based firewalls - pfSense, Smoothwall and Vyos Preview 10:34

Goals and Learning Objectives Preview 00:17

Network Attacks and Network Isolation - Introduction and IOT Preview 06:34

Network Attacks and Network Isolation - Arp Spoofing and Switches Preview 06:19

Effective Network Isolation Part 1 Preview 12:27

Effective Network Isolation Part 2 Preview 07:26

Goals and Learning Objectives Preview 00:25

Wi-Fi Weaknesses - WEP Preview 02:28

Wi-Fi Weaknesses - WPA, WPA2, TKIP and CCMP Preview 13:40

Wi-Fi Weaknesses - Wi-Fi Protected Setup WPS, Evil Twin and Rouge AP Preview 06:49

Wi-Fi Security Testing Preview 04:01

Wireless Security - Secure Configuration and Network Isolation Preview 14:18

Wireless security - RF Isolation and Reduction Preview 03:01

Wireless security - Who is on my Wi-Fi Network? Preview 03:20

Goals and Learning Objectives Preview 00:17

Syslog Preview 16:59

Network Monitoring - Wireshark, tcpdump, tshark, iptables Part 1 Preview 14:01

Network Monitoring - Wireshark, tcpdump, tshark, iptables Part 2 Preview 07:59

Wireshark - Finding malware and hackers - Part 1 Preview 15:46

Wireshark - Finding malware and hackers - Part 2 Preview 08:12

Network Monitoring - Wincap, NST, Netminer and NetWorx Preview 01:38

Goals and Learning Objectives Preview 00:23

Types of Tracking Preview 04:25

IP Address Preview 05:27

3rd Party Connections Preview 04:25

HTTP Referer Preview 03:21

Cookies and Scripts Preview 07:59

Super Cookies Preview 05:12

Browser Fingerprinting and Browser Volunteered Information Preview 02:36

Browser and Browser Functionality Preview 01:39

More Tracking Preview 02:48

Browser and Internet Profiling Preview 06:35

Goals and Learning Objectives Preview 00:19

Search Engine Tracking, Censorship and Privacy Preview 12:44

Ixquick and Startpage Preview 07:56

DuckDuckGo Preview 03:44

Disconnect search Preview 04:43

YaCy Preview 03:32

Private and Anonymous Searching Preview 07:34

Goals and Learning Objectives Preview 00:21

Which Browser – Choice of Browser Preview 06:01

Reducing the Browser Attack Surface Preview 11:34

Browser Hacking Demo Preview 09:25

Browser Isolation and Compartmentalization Preview 06:10

Firefox Security, Privacy and Tracking Preview 12:26

uBlock origin - HTTP Filters, ad and track blockers Preview 14:13

uMatrix - HTTP Filters, ad and track blockers Preview 07:14

Disconnect, Ghostery, Request policy - HTTP Filters, ad and track blockers Preview 06:37

ABP, Privacy badger, WOT - HTTP Filters, ad and track blockers Preview 06:46

No-script - HTTP Filters, ad and track blockers Preview 08:29

Policeman and others - HTTP Filters, ad and track blockers Preview 03:56

History, Cookies and Super cookies Part 1 Preview 11:43

History, Cookies and Super cookies Part 2 Preview 12:13

HTTP Referer Preview 02:19

Browser Fingerprinting Preview 18:26

Certificates and Encryption Preview 11:29

Firefox Hardening Preview 18:49

Goals and Learning Objectives Preview 00:31

Password Attacks Preview 03:22

How Passwords are Cracked - Hashes - Part 1 Preview 16:17

How Passwords are Cracked - Hashcat - Part 2 Preview 07:09

Operating System Passwords Preview 02:27

Password Managers - An Introduction Preview 02:07

Password Managers - Master Password Preview 05:12

Password Managers - KeePass, KeePassX and KeyPassXC Preview 05:55

Password Managers - LastPass Preview 11:22

Password Managers - Hardening Lastpass Preview 07:34

Creating a Strong Password That You Can Remember - Part 1 Preview 08:53

Creating a Strong Password That You Can Remember - Part 2 Preview 09:23

Multi-Factor Authentication - Soft Tokens - Google Authenticator and Authy Preview 10:54

Multi-Factor Authentication - Hard Tokens - 2FA Dongles Preview 05:53

Choosing a Method of Multi-Factor Authentication Preview 02:50

Multi-Factor Authentication - Strengths and Weaknesses Preview 02:09

The Future of Password and Authentication Preview 01:22

Congratulations Preview 01:41

Certificate Of Completion for CPEs Preview 00:56

Which VPN protocol is best to use? and why? Preview 11:43

Email Tracking and Hacking Preview 10:33

Security Vulnerabilities, Threats and Adversaries Preview 04:37

BONUS - How to Start a Career in Cyber Security Preview 00:24