Udemy
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
Development
Web Development Data Science Mobile Development Programming Languages Game Development Database Design & Development Software Testing Software Engineering Development Tools No-Code Development
Business
Entrepreneurship Communications Management Sales Business Strategy Operations Project Management Business Law Business Analytics & Intelligence Human Resources Industry E-Commerce Media Real Estate Other Business
Finance & Accounting
Accounting & Bookkeeping Compliance Cryptocurrency & Blockchain Economics Finance Finance Cert & Exam Prep Financial Modeling & Analysis Investing & Trading Money Management Tools Taxes Other Finance & Accounting
IT & Software
IT Certification Network & Security Hardware Operating Systems Other IT & Software
Office Productivity
Microsoft Apple Google SAP Oracle Other Office Productivity
Personal Development
Personal Transformation Personal Productivity Leadership Career Development Parenting & Relationships Happiness Esoteric Practices Religion & Spirituality Personal Brand Building Creativity Influence Self Esteem & Confidence Stress Management Memory & Study Skills Motivation Other Personal Development
Design
Web Design Graphic Design & Illustration Design Tools User Experience Design Game Design Design Thinking 3D & Animation Fashion Design Architectural Design Interior Design Other Design
Marketing
Digital Marketing Search Engine Optimization Social Media Marketing Branding Marketing Fundamentals Marketing Analytics & Automation Public Relations Advertising Video & Mobile Marketing Content Marketing Growth Hacking Affiliate Marketing Product Marketing Other Marketing
Lifestyle
Arts & Crafts Beauty & Makeup Esoteric Practices Food & Beverage Gaming Home Improvement Pet Care & Training Travel Other Lifestyle
Photography & Video
Digital Photography Photography Portrait Photography Photography Tools Commercial Photography Video Design Other Photography & Video
Health & Fitness
Fitness General Health Sports Nutrition Yoga Mental Health Dieting Self Defense Safety & First Aid Dance Meditation Other Health & Fitness
Music
Instruments Music Production Music Fundamentals Vocal Music Techniques Music Software Other Music
Teaching & Academics
Engineering Humanities Math Science Online Education Social Science Language Teacher Training Test Prep Other Teaching & Academics
AWS Certification Microsoft Certification AWS Certified Solutions Architect - Associate AWS Certified Cloud Practitioner CompTIA A+ Cisco CCNA Amazon AWS CompTIA Security+ AWS Certified Developer - Associate
Graphic Design Photoshop Adobe Illustrator Drawing Digital Painting InDesign Character Design Canva Figure Drawing
Life Coach Training Neuro-Linguistic Programming Personal Development Mindfulness Meditation Personal Transformation Life Purpose Emotional Intelligence Neuroscience
Web Development JavaScript React CSS Angular PHP WordPress Node.Js Python
Google Flutter Android Development iOS Development Swift React Native Dart Programming Language Mobile Development Kotlin SwiftUI
Digital Marketing Google Ads (Adwords) Social Media Marketing Google Ads (AdWords) Certification Marketing Strategy Internet Marketing YouTube Marketing Email Marketing Retargeting
SQL Microsoft Power BI Tableau Business Analysis Business Intelligence MySQL Data Analysis Data Modeling Big Data
Business Fundamentals Entrepreneurship Fundamentals Business Strategy Online Business Business Plan Startup Freelancing Blogging Home Business
Unity Game Development Fundamentals Unreal Engine C# 3D Game Development C++ 2D Game Development Unreal Engine Blueprints Blender
30-Day Money-Back Guarantee
IT & Software Network & Security Cyber Security

The Complete Cyber Security Course : Network Security!

Volume 2 : Network Security, WiFi Security, WiFi Hackers, Firewalls, Wireshark, Secure Networking. + Password Managers
Bestseller
Rating: 4.5 out of 54.5 (10,223 ratings)
118,058 students
Created by Nathan House
Last updated 8/2020
English
English, French [Auto], 
30-Day Money-Back Guarantee

What you'll learn

  • An advanced practical skill-set in assuring network security against all threats including - advanced hackers, trackers, exploit kits, Wi-Fi attacks and much more.
  • In this volume, we take a detailed look at network security.
  • Start a career in cyber security. Become a cyber security specialist.
  • The very latest up-to-date information and methods.
  • Discover security vulnerabilities across an entire network, by using network hacking techniques and vulnerability scanning.
  • You will be able to configure firewalls on all platforms including Windows, MacOS, and Linux for all types of attack scenarios.
  • Learn to configure and architect a small network for maximum physical and wireless security.
  • Perform network monitoring to discover and identify potential hackers and malware using tools like Wireshark, Tcpdump, and Syslog.
  • Understand how we are tracked online by corporations, nation-states your ISP and others.
  • We look at search engine privacy - we will best understand how to mitigate the tracking and privacy issues of search engines and their associated services.
  • Understand how to best use methods of authentication including passwords, multi-factor authentication including soft tokens and hard tokens.
  • What are the best password managers to use and why. How passwords are cracked, and how to mitigate the password attacks.
  • A certificate of completion is available signed by the instructor Nathan House so CPE credits can be claimed. An off-site sign-up is required to provide your details for this optional certificate.
Curated for the Udemy for Business collection

Requirements

  • This course is designed for personal and home cyber security, privacy and anonymity. Most of the topics apply in the same way to a business, but the course is delivered as if to an individual for personal cyber security, privacy, and anonymity.
  • It is recommended that you watch volume 1 of this complete course before watching this volume (2) although it is not required.
  • Most items referenced in this course are free. But you may elect to purchase additional software, hardware and services discussed in the course. Although It is absolutely not necessary to buy anything to understand and follow the course.
  • You should have a basic understanding of networking concepts.
  • Please note this is volume 2 of 4 of the complete course. After the completion of all 4 volumes, you will know more than 80% of security professionals, government and law enforcement agents and even expert hackers about maintaining security, privacy, and anonymity.

Description

Become a cyber security specialist.

After this course, you will be able to discover security vulnerabilities across an entire network, by using network hacking techniques and vulnerability scanning.

You will be able to architect your network for maximum security and prevent local and remote attacks. We also cover the use of custom router firmware to provide you with better network security services.

You will understand the various types of firewalls that are available and what threats each help mitigate.

Including layer 4 firewalls like Iptables on Linux and PF on MacOS and BSD. Virtual firewalls, host-based firewalls and application based firewalls like Pfsence. We cover firewalls on all platforms including Windows, Mac OS X and Linux for all types of use scenarios.

We explore in detail wireless security, the configurations that are required for maximum security and why. How Wi-Fi is hacked and how to mitigate those attacks. Covering everything from encryption weaknesses to evil twins, RF isolation, and Wi-Fi crackers.

You will master network monitoring to discover and identify potential hackers, malware and other adversaries that might be lurking on your network. Using tools like Wireshark, Tcpdump and Syslog.

We then move away from network security and onto the details of how we are tracked online by corporations, nation-states your ISP and others. You will understand the techniques used like zombie super cookies, browser fingerprinting and how browser profiling works so third parties can establish who you are online.

We look at search engine privacy - and how to mitigate the tracking and privacy issues of search engines and their associated services.

Browser security - We cover one of the largest risks online, the browser. The doorway into your system. How to best reduce the attack surface of the browser and harden it for maximum security and privacy. A critical consideration for reducing your risk.

Finally you will fully understand how to best use methods of authentication including passwords and multi-factor authentication - soft tokens and hard tokens. 

The best password managers to use and why. How passwords are cracked, and how to mitigate the cracking.

This is volume 2 of 4 of your complete guide to cyber security privacy and anonymity.  

Who this course is for:

  • This course is for anyone who wants to become an expert in security, privacy, and anonymity. This volume covers network security attacking and defending. Online tracking and browser security.
  • For anyone who would love to gain a practical skillset in mitigating the risk from, malware, Trojans, hackers, trackers, cyber criminals and all online threats.
  • This course is for anyone who wants to keep their precious files, emails, accounts and personal information out of the hands of the bad guys.
  • For beginners and intermediate Internet users who are interested in security, safety, and privacy.
  • For those who want privacy and anonymity online from hackers, corporations and governments.
  • This course is designed for personal and home Internet security, privacy, and anonymity. Most of the topics apply in the same way to a business, but the course is delivered as if to an individual for personal cybers security, privacy, and anonymity.

Featured review

Alaric Dailey
Alaric Dailey
17 courses
3 reviews
Rating: 5.0 out of 55 months ago
While I am very well versed in security myself, and a lot of this is review, Nathan manages to come up with interesting bits that I did not know. Well worth every penny. If you have any interest in real cyber security, for any reason, these 4 courses of his will take you from "ignorant of anything" to knowing more than most of the "experts" out in the world.

Course content

13 sections • 106 lectures • 12h 25m total length

  • Preview00:34
  • Preview02:06
  • Preview11:23
  • Preview01:54
  • Preview04:19
  • Preview00:40
  • Preview03:45

  • Preview03:09

  • Goals and Learning Objectives
    00:28
  • The Home Router
    13:44
  • External Vulnerability Scanning - Shodan, Qualys & Nmap
    16:23
  • Internal Vulnerability Scanning - MBSA, Nmap, Nessus, Fing & Superscan & OpenVAS
    19:33
  • Open Source Custom Router Firmware
    11:37

  • Goals and Learning Objectives
    00:25
  • Firewalls – Host-based, network-based and virtual Part 1
    14:48
  • Firewalls – Host-based, network-based and virtual Part 2
    04:54
  • Windows - Host Based Firewalls - Windows Firewall
    10:29
  • Windows - Host Based Firewalls - Windows Firewall Control (WFC)
    05:18
  • Windows - Host Based Firewalls - Third Party
    08:45
  • Linux - Host Based Firewalls - iptables
    19:58
  • Linux - Host Based Firewalls - UFW, gufw & nftables
    12:07
  • Mac - Host based Firewalls - Application Firewall & PF
    13:52
  • Mac - Host based Firewalls - pflist, Icefloor & Murus
    07:47
  • Mac - Host based Firewalls - Little Snitch
    06:22
  • Network based firewalls - Routers - DD-WRT
    05:09
  • Network based firewalls - Hardware
    02:43
  • Network based firewalls - pfSense, Smoothwall and Vyos
    10:34

  • Goals and Learning Objectives
    00:17
  • Network Attacks and Network Isolation - Introduction and IOT
    06:34
  • Network Attacks and Network Isolation - Arp Spoofing and Switches
    06:19
  • Effective Network Isolation Part 1
    12:27
  • Effective Network Isolation Part 2
    07:26

  • Goals and Learning Objectives
    00:25
  • Wi-Fi Weaknesses - WEP
    02:28
  • Preview13:40
  • Wi-Fi Weaknesses - Wi-Fi Protected Setup WPS, Evil Twin and Rouge AP
    06:49
  • Wi-Fi Security Testing
    04:01
  • Wireless Security - Secure Configuration and Network Isolation
    14:18
  • Wireless security - RF Isolation and Reduction
    03:01
  • Wireless security - Who is on my Wi-Fi Network?
    03:20

  • Goals and Learning Objectives
    00:17
  • Syslog
    16:59
  • Network Monitoring - Wireshark, tcpdump, tshark, iptables Part 1
    14:01
  • Network Monitoring - Wireshark, tcpdump, tshark, iptables Part 2
    07:59
  • Wireshark - Finding malware and hackers - Part 1
    15:46
  • Wireshark - Finding malware and hackers - Part 2
    08:12
  • Network Monitoring - Wincap, NST, Netminer and NetWorx
    01:38

  • Goals and Learning Objectives
    00:23
  • Types of Tracking
    04:25
  • IP Address
    05:27
  • 3rd Party Connections
    04:25
  • HTTP Referer
    03:21
  • Cookies and Scripts
    07:59
  • Super Cookies
    05:12
  • Browser Fingerprinting and Browser Volunteered Information
    02:36
  • Browser and Browser Functionality
    01:39
  • More Tracking
    02:48
  • Browser and Internet Profiling
    06:35

  • Goals and Learning Objectives
    00:19
  • Search Engine Tracking, Censorship and Privacy
    12:44
  • Ixquick and Startpage
    07:56
  • DuckDuckGo
    03:44
  • Disconnect search
    04:43
  • YaCy
    03:32
  • Private and Anonymous Searching
    07:34

  • Goals and Learning Objectives
    00:21
  • Which Browser – Choice of Browser
    06:01
  • Reducing the Browser Attack Surface
    11:34
  • Preview09:25
  • Browser Isolation and Compartmentalization
    06:10
  • Firefox Security, Privacy and Tracking
    12:26
  • uBlock origin - HTTP Filters, ad and track blockers
    14:13
  • uMatrix - HTTP Filters, ad and track blockers
    07:14
  • Disconnect, Ghostery, Request policy - HTTP Filters, ad and track blockers
    06:37
  • ABP, Privacy badger, WOT - HTTP Filters, ad and track blockers
    06:46
  • No-script - HTTP Filters, ad and track blockers
    08:29
  • Policeman and others - HTTP Filters, ad and track blockers
    03:56
  • History, Cookies and Super cookies Part 1
    11:43
  • History, Cookies and Super cookies Part 2
    12:13
  • HTTP Referer
    02:19
  • Browser Fingerprinting
    18:26
  • Certificates and Encryption
    11:29
  • Firefox Hardening
    18:49

Instructor

Nathan House
Leading Cyber Security Expert
Nathan House
  • 4.6 Instructor Rating
  • 54,402 Reviews
  • 237,571 Students
  • 7 Courses

Winner of the AI "Cyber Security Educator of the Year 2020" award.

Nathan has over 24 years experience in cyber security where I have advised  some of largest companies in the world, assuring security on  multi-million and multi-billion pound projects. He is the CEO of Station X a cyber security consultancy. More recently he acted as  the lead security consultant on a number of the UKs mobile banking and  payment solutions helping secure to date over £71Bn in transactions.

My clients have included; BP, ExxonMobil, Shell, Vodafone, VISA, T-mobile, GSK, COOP Banking Group, Royal Bank of  Scotland, Natwest, Yorkshire bank, BG Group, BT, London 2012.

Over the years he have spoken at a number of security conferences,  developed free security tools, and discovered serious security  vulnerabilities in leading applications.

Qualifications and education

★ BSc. (Hons) Computing 'Networks & Communication' 1st Class Honors
★ SCF : SABSA Chartered Architect Foundation
★ CISSP : Certified Information Systems Security Professional
★ CISA : Certified Information Systems Auditor
★ CISM : Certified Information Security Manager
★ ISO 27001 Certified ISMS Lead Auditor
★ CEH : Certified Ethical Hacker
★ OSCP : Offensive Security Certified Professional





  • Udemy for Business
  • Teach on Udemy
  • Get the app
  • About us
  • Contact us
  • Careers
  • Blog
  • Help and Support
  • Affiliate
  • Terms
  • Privacy policy
  • Cookie settings
  • Sitemap
  • Featured courses
Udemy
© 2021 Udemy, Inc.