What you may be taught
- A sophisticated sensible skill-set in assuring community safety in opposition to all threats together with – superior hackers, trackers, exploit kits, Wi-Fi assaults and far more.
- On this quantity, we take an in depth take a look at community safety.
- Develop into a cyber safety specialist.
- The very newest up-to-date data and strategies.
- Uncover safety vulnerabilities throughout a complete community, by utilizing community hacking strategies and vulnerability scanning.
- It is possible for you to to configure firewalls on all platforms together with Home windows, MacOS, and Linux for every type of assault situations.
- Study to configure and architect a small community for max bodily and wi-fi safety.
- Carry out community monitoring to find and establish potential hackers and malware utilizing instruments like Wireshark, Tcpdump, and Syslog.
- Perceive how we’re tracked on-line by firms, nation-states your ISP and others.
- We take a look at search engine privateness – we’ll greatest perceive easy methods to mitigate the monitoring and privateness problems with serps and their related companies.
- Perceive easy methods to greatest use strategies of authentication together with passwords, multi-factor authentication together with tender tokens and laborious tokens.
- What are the perfect password managers to make use of and why. How passwords are cracked, and easy methods to mitigate the password assaults.
- A certificates of completion is out there signed by the teacher Nathan Home so CPE credit may be claimed. An off-site sign-up is required to offer your particulars for this non-compulsory certificates.
- This course is designed for private and residential cyber safety, privateness and anonymity. A lot of the subjects apply in the identical method to a enterprise, however the course is delivered as if to a person for private cyber safety, privateness, and anonymity.
- It is suggested that you just watch quantity 1 of this entire course earlier than watching this quantity (2) though it’s not required.
- Most objects referenced on this course are free. However it’s possible you’ll elect to buy extra software program, and companies mentioned within the course. Though It’s completely not essential to purchase something to grasp and observe the course.
- You need to have a primary understanding of networking ideas.
- Please word that is quantity 2 of Four of the whole course. After the completion of all Four volumes, you’ll know greater than 80% of safety professionals, authorities and regulation enforcement brokers and even knowledgeable hackers about sustaining safety, privateness, and anonymity.
Develop into a cyber safety specialist.
After this course, it is possible for you to to find safety vulnerabilities throughout a complete community, by utilizing community hacking strategies and vulnerability scanning.
It is possible for you to to architect your community for max safety and forestall native and distant assaults. We additionally cowl using customized router firmware to give you higher community safety companies.
You’ll perceive the varied kinds of firewalls which can be accessible and what threats every assist mitigate.
Together with layer 4 firewalls like Iptables on Linux and PF on MacOS and BSD. Digital firewalls, host-based firewalls and software primarily based firewalls like Pfsence. We cowl firewalls on all platforms together with Home windows, Mac OS X and Linux for every type of use situations.
We discover intimately wi-fi safety, the configurations which can be required for max safety and why. How Wi-Fi is hacked and easy methods to mitigate these assaults. Protecting every little thing from encryption weaknesses to evil twins, RF isolation, and Wi-Fi crackers.
You’ll grasp community monitoring to find and establish potential hackers, malware and different adversaries that is perhaps lurking in your community. Utilizing instruments like Wireshark, Tcpdump and Syslog.
We then transfer away from community safety and onto the main points of how we’re tracked on-line by firms, nation-states your ISP and others. You’ll perceive the strategies used like zombie tremendous cookies, browser fingerprinting and the way browser profiling works so third events can set up who you might be on-line.
We take a look at search engine privateness – and easy methods to mitigate the monitoring and privateness problems with serps and their related companies.
Browser safety – We cowl one of many largest dangers on-line, the browser. The doorway into your system. The way to greatest scale back the assault floor of the browser and harden it for max safety and privateness. A vital consideration for decreasing your threat.
Lastly you’ll absolutely perceive easy methods to greatest use strategies of authentication together with passwords and multi-factor authentication – tender tokens and laborious tokens.
The greatest password managers to make use of and why. How passwords are cracked, and easy methods to mitigate the cracking.