Become a cyber security specialist.
After this course, you will be able todiscover security vulnerabilities across an entire network, by using network hacking techniques and vulnerabilityscanning.
You will be able to architect your network for maximum security andprevent local and remote attacks. We also cover the use of custom routerfirmware to provide you with better network security services.
You will understandthe various types of firewalls that are available and what threats each helpmitigate.
Including layer 4 firewalls like Iptables on Linux and PF on MacOS and BSD. Virtualfirewalls, host-based firewalls and application based firewalls like Pfsence.We cover firewalls on all platforms including Windows, Mac OS X and Linux forall types of use scenarios.
We explore in detail wireless security, the configurationsthat are required for maximum security and why. How Wi-Fi is hacked and how tomitigate those attacks. Covering everything from encryption weaknesses to eviltwins, RF isolation, and Wi-Fi crackers.
You will master network monitoring to discover and identify potential hackers,malware and other adversaries that might be lurking on your network. Usingtools like Wireshark, Tcpdump and Syslog.
We then move away from network security andonto the details of how we are trackedonline by corporations, nation-states your ISP and others. You willunderstand the techniques used like zombie super cookies, browserfingerprinting and how browser profiling works so third parties can establishwho you are online.
We look at search engine privacy – and how to mitigate thetracking and privacy issues of search engines and their associated services.
Browsersecurity – We cover one of the largest risksonline, the browser. The doorway into your system. How to best reduce theattack surface of the browser and harden it for maximum security and privacy. A critical consideration for reducing your risk.
Finally you will fully understand how tobest use methods of authenticationincluding passwords and multi-factor authentication – soft tokens and hardtokens.
The best password managers to use and why. How passwords arecracked, and how to mitigate the cracking.
This is volume 2 of 4 of your complete guide to cyber security privacy and anonymity.