We may earn an affiliate commission when you visit our partners.
Course image
Nathan House

Become a cyber security specialist.

After this course, you will be able todiscover security vulnerabilities across an entire network, by using network hacking techniques and vulnerabilityscanning.

You will be able to architect your network for maximum security andprevent local and remote attacks. We also cover the use of custom routerfirmware to provide you with better network security services.

You will understandthe various types of firewalls that are available and what threats each helpmitigate.

Read more

Become a cyber security specialist.

After this course, you will be able todiscover security vulnerabilities across an entire network, by using network hacking techniques and vulnerabilityscanning.

You will be able to architect your network for maximum security andprevent local and remote attacks. We also cover the use of custom routerfirmware to provide you with better network security services.

You will understandthe various types of firewalls that are available and what threats each helpmitigate.

Including layer 4 firewalls like Iptables on Linux and PF on MacOS and BSD. Virtualfirewalls, host-based firewalls and application based firewalls like Pfsence.We cover firewalls on all platforms including Windows, Mac OS X and Linux forall types of use scenarios.

We explore in detail wireless security, the configurationsthat are required for maximum security and why. How Wi-Fi is hacked and how tomitigate those attacks. Covering everything from encryption weaknesses to eviltwins, RF isolation, and Wi-Fi crackers.

You will master network monitoring to discover and identify potential hackers,malware and other adversaries that might be lurking on your network. Usingtools like Wireshark, Tcpdump and Syslog.

We then move away from network security andonto the details of how we are trackedonline by corporations, nation-states your ISP and others. You willunderstand the techniques used like zombie super cookies, browserfingerprinting and how browser profiling works so third parties can establishwho you are online.

We look at search engine privacy - and how to mitigate thetracking and privacy issues of search engines and their associated services.

Browsersecurity - We cover one of the largest risksonline, the browser. The doorway into your system. How to best reduce theattack surface of the browser and harden it for maximum security and privacy. A critical consideration for reducing your risk.

Finally you will fully understand how tobest use methods of authenticationincluding passwords and multi-factor authentication - soft tokens and hardtokens.

The best password managers to use and why. How passwords arecracked, and how to mitigate the cracking.

This is volume 2 of 4 of your complete guide to cyber security privacy and anonymity.

Enroll now

Here's a deal for you

We found an offer that may be relevant to this course.
Save money when you learn. All coupon codes, vouchers, and discounts are applied automatically unless otherwise noted.

What's inside

Learning objectives

  • An advanced practical skill-set in assuring network security against all threats including - advanced hackers, trackers, exploit kits, wi-fi attacks and much more.
  • In this volume, we take a detailed look at network security.
  • Start a career in cyber security. become a cyber security specialist.
  • The very latest up-to-date information and methods.
  • Discover security vulnerabilities across an entire network, by using network hacking techniques and vulnerability scanning.
  • You will be able to configure firewalls on all platforms including windows, macos, and linux for all types of attack scenarios.
  • Learn to configure and architect a small network for maximum physical and wireless security.
  • Perform network monitoring to discover and identify potential hackers and malware using tools like wireshark, tcpdump, and syslog.
  • Understand how we are tracked online by corporations, nation-states your isp and others.
  • We look at search engine privacy - we will best understand how to mitigate the tracking and privacy issues of search engines and their associated services.
  • Understand how to best use methods of authentication including passwords, multi-factor authentication including soft tokens and hard tokens.
  • What are the best password managers to use and why. how passwords are cracked, and how to mitigate the password attacks.
  • A certificate of completion is available signed by the instructor nathan house so cpe credits can be claimed. an off-site sign-up is required to provide your details for this optional certificate.
  • Show more
  • Show less

Syllabus

Introduction and welcome to volume 2. Covering who the course is aimed at, study recommendations and course updates.
Welcome to Volume 2
Introduction to the Instructor!
Read more
Security Quick Win!
Target Audience
Study Recommendations
Course updates

How to start a career in cyber security and ethical hacking.

You will understand the goals and learning objectings for volume 2
Goals and Learning Objectives - Volume 2
Learn how the various network devices ensure security - Switches, Firewalls, Routers, Wireless Access points and so on. Secure your router. Learn port scanning and vulnerabiltiy scanning.
Goals and Learning Objectives
The Home Router
External Vulnerability Scanning - Shodan, Qualys & Nmap
Internal Vulnerability Scanning - MBSA, Nmap, Nessus, Fing & Superscan & OpenVAS
Open Source Custom Router Firmware
Learn how to secure you devices and network with firewalls. Host, network and virtual firewalls. The strengths and weaknesses of firewalls.
Firewalls – Host-based, network-based and virtual Part 1
Firewalls – Host-based, network-based and virtual Part 2
Windows - Host Based Firewalls - Windows Firewall
Windows - Host Based Firewalls - Windows Firewall Control (WFC)
Windows - Host Based Firewalls - Third Party
Linux - Host Based Firewalls - iptables
Linux - Host Based Firewalls - UFW, gufw & nftables
Mac - Host based Firewalls - Application Firewall & PF
Mac - Host based Firewalls - pflist, Icefloor & Murus
Mac - Host based Firewalls - Little Snitch
Network based firewalls - Routers - DD-WRT
Network based firewalls - Hardware
Network based firewalls - pfSense, Smoothwall and Vyos
Learn how to architect your network for maximum security. Prevent local and remote network attacks. Keep safe your IOT. Prevent arp attacks.
Network Attacks and Network Isolation - Introduction and IOT
Network Attacks and Network Isolation - Arp Spoofing and Switches
Effective Network Isolation Part 1
Effective Network Isolation Part 2
Learn how to architect your wireless network for maximum security. Prevent wireless network attacks. Understand wireless security, its strengths and weaknesses.
Wi-Fi Weaknesses - WEP
Wi-Fi Weaknesses - WPA, WPA2, TKIP and CCMP
Wi-Fi Weaknesses - Wi-Fi Protected Setup WPS, Evil Twin and Rouge AP
Wi-Fi Security Testing
Wireless Security - Secure Configuration and Network Isolation
Wireless security - RF Isolation and Reduction
Wireless security - Who is on my Wi-Fi Network?
Learn how to monitor your network to alert you to threats and attackers communicating secretly in and out of your network. Learn to detect and stop protocol leaks.
Syslog
Network Monitoring - Wireshark, tcpdump, tshark, iptables Part 1
Network Monitoring - Wireshark, tcpdump, tshark, iptables Part 2
Wireshark - Finding malware and hackers - Part 1
Wireshark - Finding malware and hackers - Part 2
Network Monitoring - Wincap, NST, Netminer and NetWorx
Learn about all of the methods used by ISPs, corporations, nation states and agencies to track you online and erode your privacy. From cookies to super cookies. From HTTP ETags to Web cache.
Types of Tracking
IP Address
3rd Party Connections
HTTP Referer
Cookies and Scripts
Super Cookies
Browser Fingerprinting and Browser Volunteered Information
Browser and Browser Functionality
More Tracking
Browser and Internet Profiling
Learn how your searches are logged, how search engines track you, censor you, sell your data and what you can do to prevent it.
Search Engine Tracking, Censorship and Privacy
Ixquick and Startpage
DuckDuckGo
Disconnect search
YaCy
Private and Anonymous Searching
Learn to harden your browser to reduce risk and maintain your security, privacy and anonymity. Understand browser security and the best security plugins for you.
Which Browser – Choice of Browser
Reducing the Browser Attack Surface
Browser Hacking Demo
Browser Isolation and Compartmentalization
Firefox Security, Privacy and Tracking
uBlock origin - HTTP Filters, ad and track blockers
uMatrix - HTTP Filters, ad and track blockers
Disconnect, Ghostery, Request policy - HTTP Filters, ad and track blockers
ABP, Privacy badger, WOT - HTTP Filters, ad and track blockers
No-script - HTTP Filters, ad and track blockers
Policeman and others - HTTP Filters, ad and track blockers
History, Cookies and Super cookies Part 1
History, Cookies and Super cookies Part 2
Browser Fingerprinting
Certificates and Encryption
Firefox Hardening
Passwords and Authentication Methods
Password Attacks
How Passwords are Cracked - Hashes - Part 1
How Passwords are Cracked - Hashcat - Part 2
Operating System Passwords
Password Managers - An Introduction

Good to know

Know what's good
, what to watch for
, and possible dealbreakers
Develops practical, advanced skills in network security against threats such as hackers, trackers, exploit kits, Wi-Fi attacks, and more
Provides a comprehensive study of network security
Taught by Nathan House, an experienced instructor in cyber security and ethical hacking
Offers up-to-date information and methods in cyber security
Examines a variety of network security devices, including switches, firewalls, routers, and wireless access points
Helps learners understand and mitigate network attacks and network isolation issues

Save this course

Save The Complete Cyber Security Course : Network Security! to your list so you can find it easily later:
Save

Reviews summary

Tool-focused cyber security

According to students, this course is a solid three-star introduction to cyber security but can feel too tool-specific. Students say they would have preferred more theory before diving into tools.

Activities

Be better prepared before your course. Deepen your understanding during and after it. Supplement your coursework and achieve mastery of the topics covered in The Complete Cyber Security Course : Network Security! with these activities:
Read "Network Security Essentials: Applications and Standards"
This book provides a comprehensive overview of network security concepts and standards.
Show steps
  • Purchase or borrow the book
  • Read the chapters relevant to the course topics
  • Take notes and highlight key concepts
Practice creating network diagrams
Creating network diagrams helps visualize and understand network connectivity and flow.
Browse courses on Network Architecture
Show steps
  • Select a network diagramming tool (e.g., draw.io, Lucidchart)
  • Identify the network components (e.g., devices, connections, protocols)
  • Use appropriate symbols and notations to represent the components
  • Connect the components to show the network topology
Participate in a network security discussion forum
Discussion forums provide opportunities to engage with peers and reinforce concepts.
Show steps
  • Join an online forum dedicated to network security
  • Actively participate in discussions, ask questions, and share knowledge
Five other activities
Expand to see all activities and additional details
Show all eight activities
Configure a firewall on a Linux server
Hands-on experience with configuring firewalls strengthens understanding of network protection.
Browse courses on Linux Security
Show steps
  • Choose a suitable Linux distribution and install it on a server
  • Install and configure IPTABLES, the Linux firewall
  • Create firewall rules to allow essential traffic and block unwanted access
  • Test the firewall configuration using network tools
Develop a network security policy
Creating a security policy helps students apply their knowledge and understand the importance of documentation.
Show steps
  • Identify the scope and purpose of the policy
  • Define roles and responsibilities for network security
  • Establish guidelines for network access, authentication, and encryption
  • Include measures for incident response and recovery
  • Review and update the policy regularly
Attend a cybersecurity workshop on ethical hacking
Workshops offer practical training and exposure to real-world techniques used by cybersecurity professionals.
Browse courses on Ethical Hacking
Show steps
  • Research and identify relevant workshops
  • Register and attend the workshop
  • Actively participate in hands-on exercises and discussions
Set up a small home network with enhanced security features
Hands-on experience with implementing security measures in a real-world setting reinforces learning.
Show steps
  • Configure a router with strong password and encryption
  • Install and configure a firewall/intrusion prevention system
  • Set up a guest network with limited access
  • Use network monitoring tools to detect and respond to threats
  • Regularly update firmware and software for all devices on the network
Contribute to an open-source network security tool
Contributing to open-source projects enhances understanding of network security technologies and promotes collaboration.
Show steps
  • Identify an open-source network security tool that aligns with your interests
  • Join the project community and review the codebase
  • Identify areas where you can contribute (e.g., bug fixes, feature enhancements)
  • Submit pull requests and actively engage with other contributors

Career center

Learners who complete The Complete Cyber Security Course : Network Security! will develop knowledge and skills that may be useful to these careers:
Chief Information Security Officer (CISO)
Chief Information Security Officers (CISOs) are responsible for the overall security of an organization's information systems and data. They may work on a variety of projects, such as developing security policies, implementing security controls, or responding to security breaches. CISOs typically need a strong understanding of computer security, as well as experience with security tools and technologies. The Complete Cyber Security Course: Network Security! can help CISOs stay up-to-date in the latest methods used to attack computer systems, and how to guard against such attacks.
Information Security Manager
Information Security Managers are responsible for the overall security of an organization's information systems and data. They may work on a variety of projects, such as developing security policies, implementing security controls, or responding to security breaches. Information Security Managers typically need a strong understanding of computer security, as well as experience with security tools and technologies. The Complete Cyber Security Course: Network Security! can help Information Security Managers gain a comprehensive understanding of the latest security threats and vulnerabilities, as well as the methods used to mitigate them.
Risk Manager
Risk Managers are responsible for identifying, assessing, and mitigating risks to an organization. They may work on a variety of projects, such as conducting risk assessments, developing risk management plans, or implementing risk controls. Risk Managers typically need a strong understanding of risk management principles, as well as experience with risk management tools and technologies. The Complete Cyber Security Course: Network Security! can help Risk Managers gain a comprehensive understanding of the latest security threats and vulnerabilities, as well as the methods used to manage them.
Compliance Officer
Compliance Officers are responsible for ensuring that an organization complies with all applicable laws and regulations. They may work on a variety of projects, such as developing compliance policies, conducting compliance audits, or responding to compliance violations. Compliance Officers typically need a strong understanding of compliance laws and regulations, as well as experience with compliance tools and technologies. The Complete Cyber Security Course: Network Security! can help Compliance Officers gain a comprehensive understanding of the latest security threats and vulnerabilities, as well as the methods used to mitigate them.
Privacy Officer
Privacy Officers are responsible for protecting the privacy of personal data. They may work on a variety of projects, such as developing privacy policies, conducting privacy impact assessments, or responding to privacy breaches. Privacy Officers typically need a strong understanding of privacy laws and regulations, as well as experience with privacy tools and technologies. The Complete Cyber Security Course: Network Security! can help Privacy Officers gain a comprehensive understanding of the latest privacy threats and vulnerabilities, as well as the methods used to mitigate them.
IT Auditor
IT Auditors assess the security and compliance of computer systems and networks. They may work on a variety of projects, such as conducting security audits, reviewing security policies, or testing the effectiveness of security controls. IT Auditors typically need a strong understanding of computer security, as well as experience with auditing tools and techniques. The Complete Cyber Security Course: Network Security! can help IT Auditors gain a comprehensive understanding of the latest security threats and vulnerabilities, as well as the methods used to audit them.
System Administrator
System Administrators manage and maintain computer systems and networks. They may work on a variety of projects, such as installing and configuring software, updating security patches, or troubleshooting problems. System Administrators typically need a strong understanding of computer hardware and software, as well as experience with system administration tools and technologies. The Complete Cyber Security Course: Network Security! can help System Administrators gain a comprehensive understanding of the latest security threats and vulnerabilities, as well as the methods used to mitigate them.
Security Software Developer
Security Software Developers design and develop software that helps protect computer systems and data from security threats. They may work on a variety of projects, such as developing antivirus software, firewalls, or intrusion detection systems. Security Software Developers typically need a strong understanding of computer security, as well as experience with software development tools and technologies. The Complete Cyber Security Course: Network Security! can help Security Software Developers gain a comprehensive understanding of the latest security threats and vulnerabilities, as well as the methods used to mitigate them.
Cybercrime Investigator
Cybercrime Investigators investigate and prosecute cybercrimes. They may work on a variety of projects, such as investigating hacking, fraud, or child exploitation. Cybercrime Investigators typically need a strong understanding of computer forensics, as well as experience with law enforcement and investigative techniques. The Complete Cyber Security Course: Network Security! can help Cybercrime Investigators develop the skills and knowledge needed to conduct effective cybercrime investigations.
Forensic Analyst
Forensic Analysts investigate computer crimes and security breaches. They may work on a variety of projects, such as collecting evidence, analyzing data, or testifying in court. Forensic Analysts typically need a strong understanding of computer forensics, as well as experience with forensic tools and technologies. The Complete Cyber Security Course: Network Security! can help Forensic Analysts gain a comprehensive understanding of the latest security threats and vulnerabilities, as well as the methods used to investigate them.
Penetration Tester
Penetration Testers assess the security of computer systems by simulating attacks. They may work on a variety of projects, such as testing the security of websites, networks, or applications. Penetration Testers typically need a strong understanding of computer security, as well as experience with security tools and technologies. The Complete Cyber Security Course: Network Security! can help Penetration Testers develop the skills and knowledge needed to conduct effective penetration tests.
Security Consultant
Security Consultants provide advice and guidance to organizations on how to improve their security posture. They may work on a variety of projects, such as conducting security assessments, developing security plans, or implementing security controls. Security Consultants typically need a strong understanding of computer security, as well as experience with security tools and technologies. The Complete Cyber Security Course: Network Security! can help Security Consultants gain a comprehensive understanding of the latest security threats and vulnerabilities, as well as methods for mitigating them.
Information Security Analyst
Information Security Analysts plan and implement security measures to protect an organization's information systems and data. They may work on a variety of projects, such as developing security policies, conducting security audits, or investigating security breaches. Information Security Analysts typically need a strong understanding of computer security, as well as experience with security tools and technologies. The Complete Cyber Security Course: Network Security! is a valuable resource for Information Security Analysts, providing up-to-date information on the latest security threats and vulnerabilities, as well as methods for mitigating them.
Network Security Engineer
Network Security Engineers design, implement, and maintain the security of computer networks. They may work on a variety of projects, such as developing new security policies, implementing firewalls and intrusion detection systems, or responding to security breaches. Network Security Engineers typically need a strong understanding of computer networking and security, as well as experience with security tools and technologies. The Complete Cyber Security Course: Network Security! can help Network Security Engineers stay up-to-date in the latest methods used to attack computer systems, and how to guard against such attacks.
Computer Systems Analyst
Computer Systems Analysts help design, implement, and maintain computer systems for organizations. They may work on a variety of projects, such as developing new software applications, upgrading existing systems, or troubleshooting problems. Computer Systems Analysts typically need a strong understanding of computer hardware and software, as well as analytical and problem-solving skills. The Complete Cyber Security Course: Network Security! can help Computer Systems Analysts update their skill set in one of the critical areas of keeping secure not only data, but also computer networks.

Reading list

We've selected 18 books that we think will supplement your learning. Use these to develop background knowledge, enrich your coursework, and gain a deeper understanding of the topics covered in The Complete Cyber Security Course : Network Security!.
A comprehensive course that covers various aspects of network security, including firewalls, intrusion detection, and vulnerability assessment. Provides hands-on exercises and examples to help learners develop practical skills in securing networks.
An advanced textbook that delves deeply into the theoretical and practical aspects of computer security. It provides a comprehensive reference.
A comprehensive textbook covering the fundamentals of cryptography and network security. Provides a strong theoretical foundation.
A practical guide to securing Wi-Fi networks, covering various security measures, protocols, and best practices. Helps readers understand the vulnerabilities and threats associated with Wi-Fi and provides effective solutions.
A detailed guide to network penetration testing, covering various techniques, tools, and methodologies. Provides hands-on exercises and case studies to help readers develop practical skills in identifying and exploiting vulnerabilities.
A comprehensive textbook covering the wide range of topics in network security. It provides a solid foundation.
A comprehensive guide to wireless security, covering both theoretical and practical aspects. Provides valuable insights into securing wireless networks.
Provides a comprehensive overview of network security concepts and best practices. It good starting point for learners who are new to the field of network security.
A comprehensive guide to web application security, covering common vulnerabilities, attack techniques, and defense strategies. Provides detailed examples and case studies to help readers understand and prevent web application attacks.
A practical guide to network security assessment, covering various techniques, tools, and methodologies. Provides step-by-step instructions and case studies to help readers identify and mitigate security risks.
A practical guide to network security testing using Kali Linux, covering various techniques, tools, and methodologies. Provides hands-on exercises and examples to help readers develop practical skills in identifying and exploiting vulnerabilities.
A comprehensive textbook that covers various aspects of computer security, including network, operating system, and application security. Provides a global perspective on security issues and best practices.
Provides a beginner-friendly guide to network security. It acts as a useful reference book.
A comprehensive textbook that covers various aspects of computer security, including network, application, and operating system security. Provides a solid foundation in security principles and concepts.
A concise and practical guide covering the essential aspects of cyber security. Provides a good overview of the subject.
Covers the fundamentals of network security in an easy-to-understand manner. It serves as a good starting point.

Share

Help others find this course page by sharing it with your friends and followers:

Similar courses

Here are nine courses similar to The Complete Cyber Security Course : Network Security!.
The Complete Cyber Security Course : Anonymous Browsing!
Most relevant
Security and Privacy in TOR Network
Most relevant
Cisco Core Security: Network Security Fundamentals
Most relevant
Web Connectivity and Security in Embedded Systems
Most relevant
Azure Cloud Security
Most relevant
Security Features and Advanced Threat Prevention
Most relevant
CompTIA Linux+: Security
Most relevant
Connect and Protect: Networks and Network Security
Most relevant
Network Security
Most relevant
Our mission

OpenCourser helps millions of learners each year. People visit us to learn workspace skills, ace their exams, and nurture their curiosity.

Our extensive catalog contains over 50,000 courses and twice as many books. Browse by search, by topic, or even by career interests. We'll match you to the right resources quickly.

Find this site helpful? Tell a friend about us.

Affiliate disclosure

We're supported by our community of learners. When you purchase or subscribe to courses and programs or purchase books, we may earn a commission from our partners.

Your purchases help us maintain our catalog and keep our servers humming without ads.

Thank you for supporting OpenCourser.

© 2016 - 2024 OpenCourser