Become a cyber security specialist.
After this course, you will be able todiscover security vulnerabilities across an entire network, by using network hacking techniques and vulnerabilityscanning.
Become a cyber security specialist.
After this course, you will be able todiscover security vulnerabilities across an entire network, by using network hacking techniques and vulnerabilityscanning.
You will be able to architect your network for maximum security andprevent local and remote attacks. We also cover the use of custom routerfirmware to provide you with better network security services.
You will understandthe various types of firewalls that are available and what threats each helpmitigate.
Including layer 4 firewalls like Iptables on Linux and PF on MacOS and BSD. Virtualfirewalls, host-based firewalls and application based firewalls like Pfsence.We cover firewalls on all platforms including Windows, Mac OS X and Linux forall types of use scenarios.
We explore in detail wireless security, the configurationsthat are required for maximum security and why. How Wi-Fi is hacked and how tomitigate those attacks. Covering everything from encryption weaknesses to eviltwins, RF isolation, and Wi-Fi crackers.
You will master network monitoring to discover and identify potential hackers,malware and other adversaries that might be lurking on your network. Usingtools like Wireshark, Tcpdump and Syslog.
We then move away from network security andonto the details of how we are trackedonline by corporations, nation-states your ISP and others. You willunderstand the techniques used like zombie super cookies, browserfingerprinting and how browser profiling works so third parties can establishwho you are online.
We look at search engine privacy - and how to mitigate thetracking and privacy issues of search engines and their associated services.
Browsersecurity - We cover one of the largest risksonline, the browser. The doorway into your system. How to best reduce theattack surface of the browser and harden it for maximum security and privacy. A critical consideration for reducing your risk.
Finally you will fully understand how tobest use methods of authenticationincluding passwords and multi-factor authentication - soft tokens and hardtokens.
The best password managers to use and why. How passwords arecracked, and how to mitigate the cracking.
This is volume 2 of 4 of your complete guide to cyber security privacy and anonymity.
How to start a career in cyber security and ethical hacking.
OpenCourser helps millions of learners each year. People visit us to learn workspace skills, ace their exams, and nurture their curiosity.
Our extensive catalog contains over 50,000 courses and twice as many books. Browse by search, by topic, or even by career interests. We'll match you to the right resources quickly.
Find this site helpful? Tell a friend about us.
We're supported by our community of learners. When you purchase or subscribe to courses and programs or purchase books, we may earn a commission from our partners.
Your purchases help us maintain our catalog and keep our servers humming without ads.
Thank you for supporting OpenCourser.