Autoplay
Autocomplete
Previous Lesson
Complete and Continue
The Complete Cyber Security Course! Volume 2 : Network Security
Section: 1 Introduction
1. Welcome to Volume 2 (0:34)
2. Introduction to the Instructor! (2:06)
3. Security Quick Win! (11:24)
4. Target Audience (1:54)
5. Study Recommendations (4:34)
6. The Forum - For Questions, Answers and Other Resources (1:34)
7. Course updates (0:40)
Section: 2 Goals and Learning Objectives - Volume 2
8. Goals and Learning Objectives - Volume 2 (3:09)
Section: 3 Routers - Port and Vulnerability scanning
9. Goals and Learning Objectives (0:28)
10. The Home Router (13:44)
11. External Vulnerability Scanning - Shodan, Qualys & Nmap (16:23)
12. Internal Vulnerability Scanning - MBSA, Nmap, Nessus, Fing & Superscan & OpenVAS (19:33)
13. Open Source Custom Router Firmware (11:37)
Section: 4 Firewalls
14. Goals and Learning Objectives (0:25)
15. Firewalls – Host-based, network-based and virtual Part 1 (14:48)
16. Firewalls – Host-based, network-based and virtual Part 2 (4:54)
17. Windows - Host Based Firewalls - Windows Firewall (10:29)
18. Windows - Host Based Firewalls - Windows Firewall Control (WFC) (5:18)
19. Windows - Host Based Firewalls - Third Party (8:45)
20. Linux - Host Based Firewalls - iptables (19:59)
21. Linux - Host Based Firewalls - UFW, gufw & nftables (12:08)
22. Mac OS X - Host based Firewalls - Application Firewall & PF (13:52)
23. Mac OS X - Host based Firewalls - pflist, Icefloor & Murus (7:48)
24. Mac OS X - Host based Firewalls - Little Snitch (6:22)
25. Network based firewalls - Routers - DD-WRT (5:09)
26. Network based firewalls - Hardware (2:43)
27. Network based firewalls - PFsence, Smoothwall and Vyos (10:34)
Section: 5 Network Attacks, Architecture and Isolation
28. Goals and Learning Objectives (0:17)
29. Network Attacks and Network Isolation - Introduction and IOT (6:35)
30. Network Attacks and Network Isolation - Arp Spoofing and Switches (6:19)
31. Effective Network Isolation Part 1 (12:27)
32. Effective Network Isolation Part 2 (7:26)
Section: 6 Wireless and Wi-Fi Security
33. Goals and Learning Objectives (0:25)
34. Wi-Fi Weaknesses - WEP (2:28)
35. Wi-Fi Weaknesses - WPA, WPA2, TKIP and CCMP (13:40)
36. Wi-Fi Weaknesses - Wi-Fi Protected Setup WPS, Evil Twin and Rouge AP (6:49)
37. Wi-Fi Security Testing (4:01)
38. Wireless Security - Secure Configuration and Network Isolation (14:18)
39. Wireless security - RF Isolation and Reduction (3:01)
40. Wireless security - Who is on my Wi-Fi Network? (3:20)
Section: 7 Network Monitoring for Threats
41. Goals and Learning Objectives (0:17)
42. Syslog (16:59)
43. Network Monitoring - Wireshark, tcpdump, tshark, iptables Part 1 (14:01)
44. Network Monitoring - Wireshark, tcpdump, tshark, iptables Part 2 (7:59)
45. Wireshark - Finding malware and hackers - Part 1 (15:46)
46. Wireshark - Finding malware and hackers - Part 2 (8:12)
47. Network Monitoring - Wincap, NST, Netminer and NetWorx (1:39)
Section: 8 How We Are Tracked Online
48. Goals and Learning Objectives (0:23)
49. Types of Tracking (4:25)
50. IP Address (5:27)
51. 3rd Party Connections (4:25)
52. HTTP Referer (3:21)
53. Cookies and Scripts (8:00)
54. Super Cookies (5:12)
55. Browser Fingerprinting and Browser Volunteered Information (2:36)
56. Browser and Browser Functionality (1:39)
57. More Tracking (2:48)
58. Browser and Internet Profiling (6:35)
Section: 9 Search Engines and Privacy
59. Goals and Learning Objectives (0:19)
60. Search Engine Tracking, Censorship and Privacy (12:44)
61. Ixquick and Startpage (7:56)
62. DuckDuckGo (3:44)
63. Disconnect search (4:43)
64. Yacy (3:32)
65. Private and Anonymous Searching (7:34)
Section: 10 Browser Security and Tracking Prevention
66. Goals and Learning Objectives (0:21)
67. Which Browser – Choice of Browser (6:01)
68. Reducing the Browser Attack Surface (11:34)
69. Browser Hacking Demo (9:26)
70. Browser Isolation and Compartmentalization (6:10)
71. Firefox Security, Privacy and Tracking (12:26)
72. uBlock origin - HTTP Filters, ad and track blockers (14:13)
73. uMatrix - HTTP Filters, ad and track blockers (7:14)
74. Disconnect, Ghostery, Request policy - HTTP Filters, ad and track blockers (6:37)
75. ABP, Privacy badger, WOT - HTTP Filters, ad and track blockers (6:46)
76. No-script - HTTP Filters, ad and track blockers (8:29)
77. Policeman and others - HTTP Filters, ad and track blockers (3:56)
78. History, Cookies and Super cookies Part 1 (11:43)
79. History, Cookies and Super cookies Part 2 (12:13)
80. HTTP Referer (2:19)
81. Browser Fingerprinting (18:26)
82. Certificates and Encryption (11:29)
83. Firefox Hardening (18:49)
Section: 11 Passwords and Authentication Methods
84. Goals and Learning Objectives (0:31)
85. Password Attacks (3:22)
86. How Passwords are Cracked - Hashes - Part 1 (16:17)
87. How Passwords are Cracked - Hashcat - Part 2 (7:09)
88. Operating System Passwords (2:27)
89. Password Managers - An Introduction (2:07)
90. Password Managers - Master Password (5:12)
91. Password Managers - Keepass and Keepassx (4:59)
92. Password Managers - Lastpass (11:22)
93. Password Managers - Hardening Lastpass (7:34)
94. Creating a Strong Password That You Can Remember - Part 1 (8:53)
95. Creating a Strong Password That You Can Remember - Part 2 (9:23)
96. Multi-Factor Authentication - Soft Tokens - Google Authenticator and Authy (10:54)
97. Multi-Factor Authentication - Hard Tokens - 2FA Dongles (5:53)
98. Choosing a Method of Multi-Factor Authentication (2:50)
99. Multi-Factor Authentication - Strengths and Weaknesses (2:09)
100. The Future of Password and Authentication (1:22)
Section: 12 BONUS Section... Whats Next?...Volume 3 and 4
101. Important Information (0:46)
102. Congratulations (1:41)
103. Certificate of Completion for CPEs (0:56)
104. BONUS Lecture from Volume 3 - Which VPN protocol is best to use? and why? (11:43)
105. BONUS Lecture from Volume 4 - Email Tracking and Hacking (10:33)
106. BONUS Lecture from Volume 1 - Security Vulnerabilities, Threats and Adversaries (4:37)
80. HTTP Referer
Lesson content locked
If you're already enrolled,
you'll need to login
.
Enroll in Course to Unlock