We may earn an affiliate commission when you visit our partners.
Seyed Farshid Miri and Seyed Farhad Miri

When it comes to open-source, the sky is the limit.

In a nutshell, you will build a company-like network with headquarter and branch office on Unix-like OSs and open-source tools, then try to hack its vulnerabilities.

From switches to endpoints, clustered firewalls, servers incl. Network Access Control, shortly NAC server, jumpers, and anything else are all built on a flavor of Linux OS such as openSUSE, AlpineLinux, Debian, Ubuntu, etc., or a Unix-like OS such as FreeBSD.

Network security should be embedded into the nature of the corporate's network and that is what we learn in this course.

Read more

When it comes to open-source, the sky is the limit.

In a nutshell, you will build a company-like network with headquarter and branch office on Unix-like OSs and open-source tools, then try to hack its vulnerabilities.

From switches to endpoints, clustered firewalls, servers incl. Network Access Control, shortly NAC server, jumpers, and anything else are all built on a flavor of Linux OS such as openSUSE, AlpineLinux, Debian, Ubuntu, etc., or a Unix-like OS such as FreeBSD.

Network security should be embedded into the nature of the corporate's network and that is what we learn in this course.

We do not care much about vendors and logos, but practical concepts. For example, we dive into Shell commands, TCP/IP and networking fundamental concepts, and core network security principles using open-source, yet industry-proven products.

We aim to teach you how standard networking concepts are "designed" and are also "applied" in work environments.

Why a pure Linux-based network? Besides the fact that Linux runs the world, if you learn the secure networking using Linux, Unix, and open-source tools, you will feel pretty confident about their commercial equivalents. For example, if you learn network firewalling using iptables and nftables, you won't have any issues with Cisco FirePower, FortiGate, or Juniper firewalls.

As said, we are not into vendors, we are interested in standardized theoretical concepts and practical technics. This method will give you a firm conceptual understanding of underlying technologies and ideas about how finished products like Cisco switches, Fortigate Firewalls, Cisco

In the end, you will run the most common network attacks using Kali Linux against the network you built yourself.

Your Learning Key-Terms:

Virtualization

GNS3 Lab (with Hyper-V & VirtualBox Integration)

TCP/IP

OSI Model

Network Topologies

IP Subnetting

VLAN

Traffic Tagging

Trunking

NIC Teaming

LAGG (Link Aggregation)

MLAG (Multi-Chassis Link Aggregation)

Bond Modes: Active-Backup, 802.3ad (LACP)

Bridging

Spanning Tree

Inter-VLAN Routing

Routing & ARP Tables

MAC Flood

IEEE 802.1X & MAB (MAC Address Bypass)

Network Access Control (NAC)

PacketFence (Open Source NAC)

Extensible Authentication Protocol (EAP) (EAPoL)

RADIUS (FreeRADIUS)

Linux Open Source Networking

Nvidia Cumulus Linux Switch

openSUSE Linux

Ubuntu Linux

Alpine Linux

Linux Shell Command Line

Firewalls

Netfilter Framework

Packet Filtering

iptables

nftables

Packet Capture Analysis

Wireshark, TShark, Termshark, and TCPDump

Linux Clustering

keepalived

VRRP

ConnTrack

Virtual Private Network (VPN)

OpenVPN

strongSwan IPSec (swanctl)

WireGuard

pfSense Firewall (FreeBSD)

pfSense Cluster

Next-Gen Firewall

Demilitarized Zone (DMZ)

Ethical Hacking Network Attacks and Technics

SSH BruteForce Attack

MITM with Mac Spoofing Attack

MITM with DHCP Spoofing Attack

DOS Attack (POD, SYNFLOOD, BPDUs, CDP)

Yersinia

DHCP Starvation

DNS Spoofing

Offensive Packet Sniffing

ARP spoofing, ARP cache poisoning attack

Network hacking

Cyber security

Network Hardening Solutions

Enroll now

Here's a deal for you

We found an offer that may be relevant to this course.
Save money when you learn. All coupon codes, vouchers, and discounts are applied automatically unless otherwise noted.

What's inside

Learning objectives

  • Learn network security, open networking & linux engineering in one tutorial
  • Building up a company-grade segmented network entirely on unix-like oss
  • Grasp the full picture of the underlying technologies in network security
  • Project-based learning of firewall clusters on opensuse linux as well as pfsense
  • Learn about nac (802.1x, eap, eapol) using packetfence to reject or accpet clients on switches
  • Networking core fundamentals such as traffic tagging using vlans, trunking, stp, subnetting, lag, mlag, etc.
  • Learn firewall's core functionalities & be able to work with any firewall, no matter what brand
  • Initial to advanced configuration of nvidia cumulus linux switches
  • Learn how head & branch offices securely communicate using ipsec site to site vpn
  • Learn most common network attacks and penetration testing technics
  • Learn underlying cluster technologies e.g. keepalived & vrrp on linux
  • Practicing network security by segmentation, compartmentalization, & isolation
  • Learn how to create different vlans in a company and control their traffic on each other
  • Setting up linux based dhcp server to serve ip addresses in different vlans
  • Learn network redundency methods e.g. lacp (802.3ad), balance-rr, balance-xor, etc. on linux, pfsense and cumulus switch
  • Learn how to migrate from iptables to nftables
  • Project-based learning of advanced pfsense firewall features
  • Project-based learning of packet capture & analysis using wireshark, tshark, termshark & tcpdump
  • Learn about opensuse, alpinelinux, debian, ubuntu and freebsd
  • Implement ipsec vpn on opensuse using strongswan
  • Configuring openvpn remote access for home office users
  • Configuring wireguard remote access for iot devices (key based authentication)
  • Learn how to harden ssh logins using two-factor authentication (2fa)
  • Learn virtualization using virtualbox and gns3
  • Yersinia attack toolkit
  • Show more
  • Show less

Syllabus

Part 1: 50 "must-know" shell commands working on any Unix-like OS since 70s
Part 2: 50 "must-know" shell commands working on any Unix-like OS since 70s
Read more

Traffic lights

Read about what's good
what should give you pause
and possible dealbreakers
Covers network security principles using open-source tools, which are highly relevant for professionals seeking practical experience with industry-standard technologies
Explores Linux-based networking, which provides a strong foundation for system administrators looking to enhance their skills in network configuration and security
Includes hands-on labs using GNS3, which allows learners to simulate real-world network environments and practice network security techniques in a safe environment
Examines network attacks using Kali Linux, which is a valuable skill for network engineers and security professionals who need to understand and mitigate potential threats
Requires familiarity with Linux command line and networking concepts, which may necessitate additional preparation for individuals without prior experience in these areas
Teaches iptables and nftables, which are essential tools for Linux firewall management, but learners should be aware that other firewall solutions exist and may be more prevalent in some environments

Save this course

Create your own learning path. Save this course to your list so you can find it easily later.
Save

Reviews summary

Hands-on open-source network security project

According to learners, this course offers a highly practical and project-based approach to building and securing a company network using open-source tools. Many find it an excellent resource for understanding underlying network security concepts without being tied to specific vendors. The course provides a deep dive into various technologies like pfSense, nftables, PacketFence, and VPNs (IPSec, OpenVPN, Wireguard). While the GNS3 lab setup can be challenging and resource-intensive for some, the hands-on experience gained from building the network is highly valued. Students appreciate the breadth of topics covered, from network fundamentals to ethical hacking techniques against the built network.
Attacking the built network is insightful.
"The ethical hacking part at the end was a great way to test the network I built."
"Seeing the network attacks in action helped reinforce the security measures learned."
"Using Kali Linux to perform attacks was an engaging finale."
"Understanding vulnerabilities from an attacker's perspective is very valuable."
Explains fundamental principles well.
"The focus on theoretical concepts alongside practical application is a strength."
"Helped me understand the 'why' behind network security configurations."
"Goes beyond just commands; it explains how things are designed and applied."
"Solidified my understanding of TCP/IP and networking fundamentals."
Wide range of advanced topics covered.
"The course dives deep into technologies like nftables, PacketFence, and various VPN types."
"Covers a lot of ground - from basic networking to firewall clusters and NAC."
"Learned about VRRP, LACP, and other advanced switching/routing concepts."
"The sections on IPSec and Wireguard VPNs were particularly useful."
Excellent use of open-source tools.
"Focusing on open-source networking tools provides valuable, vendor-neutral knowledge."
"Using Linux, pfSense, Cumulus, and PacketFence was a major plus for me."
"Learning these open-source alternatives makes understanding commercial products easier."
"The open-source tools used are highly relevant in many professional environments."
Hands-on network building is the core.
"This course is project-based and hands-on, which is exactly what I was looking for."
"The practical exercises and building the network step-by-step solidifies the concepts better than just lectures."
"Really appreciated building the network from scratch, it made everything click."
"I learned so much by actually doing the labs and building out the topology in GNS3."
Not for absolute beginners in networking/Linux.
"Some familiarity with Linux command line and basic networking is recommended."
"Found it moved quite fast if you don't have a prior networking background."
"Assumes a certain level of comfort with virtualization and command-line interfaces."
"Definitely need some foundational knowledge before tackling this course."
Lab environment setup can be difficult.
"Setting up the GNS3 environment and getting all the VMs to work correctly was the hardest part."
"The GNS3 lab requires a significant amount of system resources."
"I struggled initially with the GNS3 setup mentioned in the course, needed external help."
"While the labs are great, the initial GNS3 configuration section could be more detailed or offer alternatives."

Activities

Be better prepared before your course. Deepen your understanding during and after it. Supplement your coursework and achieve mastery of the topics covered in Secure Networking - A Company Network Project on Open-Source with these activities:
Review TCP/IP Fundamentals
Solidify your understanding of TCP/IP fundamentals to better grasp network communication and troubleshooting concepts covered in the course.
Browse courses on TCP/IP Model
Show steps
  • Review the layers of the TCP/IP model.
  • Study common protocols at each layer.
  • Practice subnetting and IP addressing.
Review 'Practical Packet Analysis'
Enhance your packet analysis skills using Wireshark, a key tool for understanding network traffic and identifying security threats.
Show steps
  • Read the chapters on TCP/IP and common network protocols.
  • Practice analyzing PCAP files using Wireshark.
  • Experiment with filters to isolate specific traffic.
Practice Linux Shell Scripting
Reinforce your Linux command-line skills by practicing shell scripting exercises to automate network configurations and security tasks.
Show steps
  • Write scripts to automate network configuration tasks.
  • Create scripts to monitor network traffic and logs.
  • Develop scripts to automate security tasks.
Four other activities
Expand to see all activities and additional details
Show all seven activities
Review 'Network Security Assessment'
Deepen your understanding of network security assessment techniques to identify and mitigate vulnerabilities in your network.
Show steps
  • Read the chapters on vulnerability scanning and penetration testing.
  • Practice using network security assessment tools.
  • Analyze the results of security assessments.
Build a Home Lab Network
Apply the concepts learned in the course by building a small home lab network with virtual machines and open-source tools.
Show steps
  • Set up a virtualized environment using VirtualBox or GNS3.
  • Configure virtual machines with Linux distributions.
  • Implement network segmentation using VLANs.
  • Set up a firewall and VPN for secure remote access.
Document Your Network Project
Solidify your understanding by documenting the design, configuration, and security measures of your network project.
Show steps
  • Create a network diagram illustrating the topology.
  • Document the configuration of each network device.
  • Describe the security measures implemented.
  • Explain the reasoning behind design choices.
Contribute to an Open-Source Networking Project
Gain practical experience by contributing to an open-source networking project, such as reporting bugs, writing documentation, or contributing code.
Show steps
  • Identify an open-source networking project of interest.
  • Explore the project's codebase and documentation.
  • Contribute by reporting bugs, writing documentation, or submitting code.

Career center

Learners who complete Secure Networking - A Company Network Project on Open-Source will develop knowledge and skills that may be useful to these careers:
Network Security Engineer
A network security engineer specializes in securing network infrastructure. With the comprehensive exploration of network security principles and hands-on experience with open-source tools, this course prepares you for the challenges of protecting networks from cyber threats. The course covers topics, such as firewall configuration, intrusion detection, VPNs, and network access control. You will learn ethical hacking techniques and network attack methods. This allows you to proactively identify and mitigate vulnerabilities. If you aim to become a network security engineer, this course will be extremely useful.
Network Engineer
A network engineer designs, implements, and manages an organization's network infrastructure. This course helps build a strong foundation in open-source networking tools and concepts, which are becoming increasingly important in modern network environments. By building a company-like network with headquarter and branch offices using Linux and Unix-like operating systems, you gain hands-on experience that directly translates to real-world scenarios. The course's extensive coverage of topics like VLANs, routing, firewalls (iptables, nftables, pfSense), and VPNs (IPSec, OpenVPN, WireGuard). It is a comprehensive and practical learning experience. If you wish to excel as a network engineer, this course may be helpful.
Penetration Tester
A penetration tester assesses the security of systems and networks by simulating attacks. This course's focus on ethical hacking techniques and network attack methods makes it highly relevant for aspiring penetration testers. The course provides hands-on experience with tools like Kali Linux and teaches you how to perform common network attacks, such as brute-force attacks, man-in-the-middle attacks, and denial-of-service attacks. By understanding how these attacks work, you can better identify and exploit vulnerabilities in systems and networks. The course is particularly useful for those who are interested in becoming penetration testers.
IT Security Engineer
IT security engineers implement and manage security measures to protect an organization's IT infrastructure. This course is extremely relevant, as it provides a comprehensive understanding of network security concepts and technologies. The course's hands-on approach, using open-source tools and Linux environments, helps you build the skills necessary to design and implement secure network solutions. The course may be useful for individuals aspiring to be an IT security engineer.
System Administrator
A system administrator is responsible for maintaining and administering computer systems and servers. The course's emphasis on Linux and Unix-like operating systems, along with the practical exercises in building and configuring network services, aligns perfectly with the responsibilities of a system administrator. You will learn to manage firewalls, VPNs, and network access control. The course's coverage of shell commands and network fundamentals is crucial for efficiently managing and troubleshooting systems. The course teaches you how to harden systems against attacks, ensuring the security and reliability of the infrastructure. The course will be useful for system administrators.
Cybersecurity Analyst
A cybersecurity analyst protects computer systems and networks from threats. The course on Secure Networking provides an excellent foundation for understanding network vulnerabilities and how to mitigate them. The course covers ethical hacking techniques and network attacks, enabling you to think like an attacker and proactively defend against threats. The focus on open-source tools and Linux environments is highly relevant because many security tools are built on these platforms. The course includes topics, such as intrusion detection, packet capture analysis, and network hardening solutions. This will give you a practical edge in your career as a cybersecurity analyst. The course may be useful for those in this career field.
Network Administrator
A network administrator maintains and manages network infrastructure, and the knowledge gained from this course is directly applicable to this role. You will learn by understanding how to build, configure, and troubleshoot networks using open-source tools and Linux environments. The course covers topics, such as VLANs, routing, firewalls, and VPNs. You will also gain experience with network monitoring and troubleshooting techniques. The course may provide a practical foundation for network administrators.
Information Security Analyst
Information security analysts protect organizations' data and systems from cyber threats. This course offers hands-on experience in identifying and mitigating network vulnerabilities. The course teaches you how to use open-source tools to analyze network traffic, detect intrusions, and respond to security incidents. You will develop a strong understanding of network security principles and best practices. The course's focus on practical skills and real-world scenarios will prepare you for a successful career as an information security analyst. The course may be useful for those in this career field.
Security Architect
A security architect designs and implements security systems for an organization. This course is especially helpful. You will learn how to build secure network architectures using open-source tools and Linux environments. The course covers topics, such as network segmentation, firewall design, VPN implementation, and network access control. By building a complete company-like network and implementing security measures, you gain a practical understanding of security architecture principles. A master's degree in a relevant field is typically required for the role of security architect.
Cloud Security Engineer
Cloud security engineers specialize in securing cloud-based infrastructure and applications. This course is highly relevant. It provides a strong foundation in networking and security principles that are essential for cloud deployments. The course covers topics, such as virtual networks, firewalls, VPNs, and network access control, using open-source tools and Linux environments. You will learn how to design and implement secure cloud solutions that meet industry best practices and compliance requirements. The course may be useful for those seeking to become cloud security engineers.
DevOps Engineer
A DevOps engineer automates and streamlines the software development and deployment process. This course provides valuable insights into network infrastructure and security, which are essential for ensuring the reliability and security of applications in production. The course covers topics, such as virtualization, clustering, and network configuration, which are relevant to building and managing infrastructure as code. You will gain practical experience with open-source tools and Linux environments. This will allow you to collaborate effectively with development and operations teams. The course may be useful for DevOps engineers.
Security Operations Center Analyst
Security operations center analysts monitor and analyze security events to detect and respond to cyber threats. This course is helpful. You will gain hands-on experience with network monitoring tools and techniques. The course covers topics, such as intrusion detection, packet capture analysis, and log analysis. You will learn how to identify and investigate security incidents, and how to take appropriate actions to contain and remediate threats. The course may be useful for individuals aspiring to be SOC analysts.
Security Consultant
Security consultants advise organizations on how to improve their security posture. The knowledge gained from the course provides a solid understanding of network security principles and technologies, allowing you to effectively assess and recommend security improvements. You will learn how to identify vulnerabilities, design secure network architectures, and implement security measures. The course's coverage of open-source tools and Linux environments is valuable. It positions you to offer practical and cost-effective security solutions. The course may be useful for security consultants.
Cloud Engineer
Cloud engineers design, build, and manage cloud computing environments. This course is relevant because it provides a strong foundation in networking and security concepts that are essential for cloud deployments. You will learn how to build and configure virtual networks, firewalls, and VPNs using open-source tools. The course provides hands-on experience with Linux environments, which are commonly used in cloud infrastructure. The skills gained in this course will enable you to design and implement secure and scalable cloud solutions. Those aspiring to be a cloud engineer may find this course helpful.
Data Security Analyst
Data security analysts focus on protecting sensitive data from unauthorized access and breaches. The course provides valuable knowledge and skills for securing network communications and preventing data leaks. The course covers topics, such as VPNs, firewalls, and network access control. You will also learn how to implement encryption and other security measures to protect data in transit and at rest. The course may be helpful for data security analysts.

Reading list

We've selected two books that we think will supplement your learning. Use these to develop background knowledge, enrich your coursework, and gain a deeper understanding of the topics covered in Secure Networking - A Company Network Project on Open-Source.
Provides a comprehensive guide to packet analysis using Wireshark, a crucial skill for network security and troubleshooting. It covers various network protocols and attack techniques, aligning perfectly with the course's ethical hacking and network security modules. The book is commonly used by network engineers and security professionals. It offers practical examples and real-world scenarios to enhance understanding of network traffic analysis.
Provides a practical guide to assessing network security vulnerabilities and implementing effective security measures. It covers various assessment techniques, tools, and methodologies relevant to the course's ethical hacking and network hardening modules. This book valuable resource for understanding how to identify and mitigate security risks in a network environment. It offers real-world examples and case studies to enhance practical application.

Share

Help others find this course page by sharing it with your friends and followers:

Similar courses

Similar courses are unavailable at this time. Please try again later.
Our mission

OpenCourser helps millions of learners each year. People visit us to learn workspace skills, ace their exams, and nurture their curiosity.

Our extensive catalog contains over 50,000 courses and twice as many books. Browse by search, by topic, or even by career interests. We'll match you to the right resources quickly.

Find this site helpful? Tell a friend about us.

Affiliate disclosure

We're supported by our community of learners. When you purchase or subscribe to courses and programs or purchase books, we may earn a commission from our partners.

Your purchases help us maintain our catalog and keep our servers humming without ads.

Thank you for supporting OpenCourser.

© 2016 - 2025 OpenCourser