The Complete Cyber Security Course : Network Security!
Volume 2 : Network Security, WiFi Security, WiFi Hackers, Firewalls, Wireshark, Secure Networking. + Password Managers
Created by Nathan House - Leading Cyber Security Expert
Students: 131586, Price: $119.99
Students: 131586, Price: Paid
Become a cyber security specialist.
After this course, you will be able to
discover security vulnerabilities across an entire network, by using network hacking techniques and vulnerability
You will be able to architect your network for maximum security and
prevent local and remote attacks. We also cover the use of custom router
firmware to provide you with better network security services.
You will understand
the various types of firewalls that are available and what threats each help
Including layer 4 firewalls like Iptables on Linux and PF on MacOS and BSD. Virtual
firewalls, host-based firewalls and application based firewalls like Pfsence.
We cover firewalls on all platforms including Windows, Mac OS X and Linux for
all types of use scenarios.
We explore in detail wireless security, the configurations
that are required for maximum security and why. How Wi-Fi is hacked and how to
mitigate those attacks. Covering everything from encryption weaknesses to evil
twins, RF isolation, and Wi-Fi crackers.
You will master network monitoring to discover and identify potential hackers,
malware and other adversaries that might be lurking on your network. Using
tools like Wireshark, Tcpdump and Syslog.
We then move away from network security and
onto the details of how we are tracked
online by corporations, nation-states your ISP and others. You will
understand the techniques used like zombie super cookies, browser
fingerprinting and how browser profiling works so third parties can establish
who you are online.
We look at search engine privacy - and how to mitigate the
tracking and privacy issues of search engines and their associated services.
security - We cover one of the largest risks
online, the browser. The doorway into your system. How to best reduce the
attack surface of the browser and harden it for maximum security and privacy. A critical consideration for reducing your risk.
Finally you will fully understand how to
best use methods of authentication
including passwords and multi-factor authentication - soft tokens and hard
The best password managers to use and why. How passwords are
cracked, and how to mitigate the cracking.
This is volume 2 of 4 of your complete guide to cyber security privacy and anonymity.
The Complete Nmap Ethical Hacking Course : Network Security
Become an expert in the ethical hacking and network security tool Nmap!
Created by Nathan House - Leading Cyber Security Expert
Students: 23826, Price: $99.99
Students: 23826, Price: Paid
Welcome to the Complete Nmap Course!
Nmap is the Internets most popular network scanner with advanced features that most people don't know even exists!
Discover the secrets of ethical hacking and network discovery, using Nmap on this complete course.
Nmap is an indispensable tool that all techies should know well. It is used by all good ethical hackers, penetration testers, systems administrators, and anyone in fact who wants to discovery more about the security of a network and its hosts.
You cannot be a good ethical hacker or systems administrator without being an expert in Nmap.
You will go from beginner to expert in easy to follow structured steps - and we cover all major platforms that Nmap can be used on, including - Windows, Mac, Linux and Kali.
The ideal student for this course is technically minded with an interest in ethical hacking and network security.
At the end of this course you'll have a practical skill-set in using Nmap to scan networks. You will be able to find vulnerabilities and weaknesses on systems that can be exploited by hackers.
Network Security Auditing with nmap
Learn to perform network security scanning with nmap in the right way.
Created by Krapesh Bhatt - Cyber Security Consultant
Students: 20654, Price: $19.99
Students: 20654, Price: Paid
Nmap is the most popular and flexible tool widely used by Penetration testers, network administrators, security enthusiasts & bug bounty hunters. Nmap offers a ton of options to perform scans. This course is created to master the nmap tool with clear and easy to follow instructions & hands-on demonstrations.
The contents & techniques in the course are derived from my experience as a network & web application pentester. So, I will be touching on the most relevant & straight forward techniques that actually have worked during my experience on-field.
The course will start with explanation on Basics of TCP 3-way handshake to build up the base for nmap scans to advanced for performing network security assessments with nmap security scanner.
Practical examples and underlying concepts of nmap scanner and will teach you on:
Getting started with nmap
Fundamentals of scanning.
Basic scan techniques of nmap
Detecting hosts, Operating Systems & Service versions.
Useful Nmap script scans for vulnerability detection & auditing services.
Creating scan profiles on Zenmap - Frontend for nmap.
Evading and testing firewalls
Improving scan performance
Automating nmap scans
At the end of the course, you will be proficient in:
Port scanning techniques & fine-tune nmap for speed & accuracy.
Implement the options provided by nmap scripts to perform complex scans in one go.
With powerful Nmap Scripting Engine, perform vulnerability assessments for webservers, mail servers, web applications.
Do password auditing for active services like FTP, TELNET, SSH, etc.
Test for misconfigured firewalls/IDSes and bypass weak rulesets.
Create nmap scan reports, Automate and manage network-wide scans, monitor the assets for any misconfigurations and/or vulnerabilities.
Check Point Jump Start: Network Security
Free training for new Check Point customers
Created by Check Point Software Technologies, Ltd. - Check Point Software Technologies, Ltd.
Students: 16179, Price: Free
Students: 16179, Price: Free
In this course, you will be shown how to configure, manage, and monitor your Check Point security environment.
This free training is intended for customers new to the Check Point security solution.
The modules are:
Introduction to the Check Point Solution
Deploying Check Point Security Management
Deploying Check Point Security Gateways
Creating a Security Policy
Logs and Monitoring
Support, Documentation, and Training
There is a Check Point accreditation exam available for this course at Pearson Vue, exam #156-411.
The Absolute Beginners Guide to Cyber Security 2021 – Part 2
Learn about Networking, Malware, Encryption, VPNs, Privacy, Email Security, Social Engineering, Backups and so much more
Created by Alexander Oni - Best Selling Instructor, 100,000 + Students
Students: 15066, Price: $129.99
Students: 15066, Price: Paid
** PART 2 OF THE CYBER SECURITY GUIDE FOR BEGINNERS SERIES **
Take your basic knowledge of cyber security to a whole new level with this exciting course that promises to be educational, informative and fun filled.
Build upon a basic foundation in Cyber Security with a strong focus on the following core topics.
Privacy & Anonymity
Backups & Encryption
Windows 10 Hardening
What are the main benefits of taking this course?
I am glad you asked. This course has been designed to provide you with the knowledge and tools to not only better protect yourself against malware but to also prepare you for a career in the cyber security field if you so wish.
You will learn all the latest techniques used in the world of cyber security today and understand how a lot security technologies work behind the scenes.
In this course you will learn the following practical skills
How to use a proxy server
How to setup and use a virtual private network
How to use Tor to access the dark web anonymously
Best practices to browse the internet securely and privately
How to set up a firewall
How to use a rootkit scanner
How to encrypt your emails
How to track emails you have sent and also how to detect if you are being tracked
How to use 3 major anti-malware software products
How to completely harden the Windows 10 operating system
How to backup and encrypt your hard drive
How to choose the right anti virus
and much much much more
You will also learn how to use a wide variety of software to improve your security game and these include:
Virtual Private Networks
GMER Rootkit scanner
Jobs in Cyber security are plentiful and this course will help prepare you for entry level roles by providing you with a solid set of skills to build up on.
* PERFECT FOR BEGINNERS *
You don't need to have a background in cyber security though any sort of prior knowledge would be beneficial. This course is designed in such a manner that as long as you know how to use a computer and the internet, you will be able to understand and apply everything you are taught.
Content and Overview
Suitable for non professionals and students with a basic understanding of cyber security. In this course of nearly 100 lectures and almost 7 hours of content, you’ll learn all of the core cyber security fundamentals and develop a strong understanding of how security and privacy can either be maintained or deprived from a user. Each chapter closes with a section review highlighting the core points raised in the section.
Starting with Networking 101, you will learn the basics of networking including what the TCP/IP protocol suite is and how the domain name system works.
With the basics of networking mastered, you will be ready to jump into the course proper with the following section where you will begin to learn about privacy and anonymity. You will learn how advertisers and websites are able to track you online and what you can do about it.
You will then move on to a more advanced section where you will be introduced to Anonymizers. You will learn how to work with proxy servers and how to setup and configure a Virtual Private Network. We will also explore how to use Tor to access the dark web as well as the pros and cons of using anonymizers. By the end of this section, you would have learned techniques and skills that you can use to secure your privacy online.
Section 5 covers malware with a special focus on viruses, rootkits and ransomware. You will learn how these various forms of malware can affect you plus you will also be introduced to a variety of anti-malware software that you can use to fight against malware.
We will then move to discuss about backups and encryption. You will learn about cloud backups as well the advantages and disadvantages of using this type of technology. I will then show you how you can back up and encrypt your hard drive and sensitive files.
Section 7 covers one of the most interesting aspects of cyber security - Social Engineering. You will learn about the different tactics employed by social engineers to extract important information without using any technical skills. We will explore how hackers exploit human psychology and fool their targets.
Email security will be covered in the very next section. Emails are a fundamental component of our daily lives and you will learn exactly how emails are sent and received behind the scenes. You will learn how to track emails and how to use mail services like guerrilla mail and proton mail.
In the final section of the course, you will learn how to harden the Windows 10 operating system against malware. Windows 10 by default is vulnerable to malware but with a few adjustments, you can make it far more secure and you will learn this tricks in this section.
Complete with resources and section reviews, you’ll be able to apply what you have learnt in this course either at home or at your place of work and will receive a verifiable certificate of completion upon finishing the course.
Take control of your privacy and security - Enroll Today in one of the very best cyber security courses you will find online.
Complete Cyber Security Course: The Network Security A-Z™
Cyber Security In-depth - Network Security Fundamentals (Threat, Vulnerabilities), NMAP, Firewalls & Prevent Attacks
Created by Teach Apex - Quality in Education | E-quality in Education
Students: 7392, Price: $19.99
Students: 7392, Price: Paid
Become a Network Security Specialist with this exclusive course covering every aspect of Network Security. After this course, you will be able to discover security vulnerabilities across an entire network, by using network hacking techniques and vulnerability scanning.
You will be able to architect your network for maximum security and prevent local and remote attacks. You will understand the various types of firewalls that are available and what threats each helps mitigate.
Explore wireless security, the configurations that are required for maximum security, and why. Learn how Wi-Fi is hacked and how to mitigate those attacks, covering topics from Wireless encryption weaknesses and the latest WPA3 standard.
You will master network monitoring to discover and identify potential hackers, malware, and other adversaries that might be lurking on your network. Using tools like Wireshark and Nmap.
Learn the best ways to reduce the attack surface of your network and harden it for maximum security and privacy. Finally, you will fully understand how to best use IDS and IPS in your network to secure your network.
This Network Security training can be used as a security solution for home-based or any business-sized networks, which makes it an ideal solution for securing networking activities.
After going through this course, you will find yourself at an intermediate level of knowledge regarding network security.
Aruba Network Security Basics
Learn the basics of Aruba Networking Security and how to prevent hacks with topics such as DDoS and more
Created by Experts with David Bombal - Experts helping you become an expert.
Students: 7099, Price: Free
Students: 7099, Price: Free
I'm really happy to announce that I've partnered with Aruba Education Services to bring you this free network security basics course. Learn the basics of ethical hacking and network security with Aruba.
In Aruba Network Security Basics Course, you will explore what threats pose a risk to a basic computer network and what security technologies are available to harden your devices against these attacks.
How do messages get encrypted? What exactly is Malware? What technologies can we deploy that will allow networks to defend themselves? Our lives and business rely on having trusted secure access to our networks, but what does it take to ensure that security?
The Aruba Network Security Basics course is a starting point for individuals interested in a career as a security professional, and for anyone to who wants to get familiar with Aruba’s security technologies. To get deeper technical knowledge with Aruba network security, see the Aruba Certified Network Security Associate (ACNSA) course.
Learn about a range of topics including:
- Distributed Denial of Service (DDoS) attacks
- ARP attacks
- Physical security
- Secure Protocols
- Wireless Security
There are no prerequisite, this course is foundational.
Who helped me create this free course:
Aruba Education Services offers comprehensive training from fundamental to advanced levels across Aruba’s wired, wireless, security, and cloud-managed networking portfolio. Start learning Aruba to sharpen your networking skills with leading Edge technologies. Get the training & certifications you need to make your resume stand out with Aruba Education Services!
This course covers a lot of basic network security technologies and there is more inside for you to learn.
All the best!
Cisco : CCNA Security Implementing Cisco Network Security
best practice Tests for Cisco CCNA Security Implementing Cisco Network Security Certification 2021
Created by Nadia NaNa - Nadia
Students: 6829, Price: $79.99
Students: 6829, Price: Paid
This course provides a foundational understanding of the current threat landscape and threat-defense technologies used today, and security policy and architectures. The IINS course prepares you to work in a network security role working with various technologies, such as cryptography, identity management, firewalls, and infrastructure protection.
This exam tests the candidate's knowledge of secure network infrastructure, understanding core security concepts, managing secure access, VPN encryption, firewalls, intrusion prevention, web and email content security, and endpoint security using:
Cloud & Virtual Network Topologies
BYOD, Bring Your Own Device
Identity Services Engine (ISE)
Cisco FirePOWER Next Generation IPS (under Domain 6.0)
Anti-Malware/Cisco Advanced Malware Protection
This exam validates skills for installation, troubleshooting, and monitoring of a secure network to maintain integrity, confidentiality, and availability of data and devices.
this course cover this follow Topics
Network Security Fundamentals
Cisco Self-Defending Networks
Administrative Access to Cisco Routers
AAA on a Cisco Router Using the Local Database and on Secure ACS
Locking Down the Router
Static Packet Filters Using ACLs
Cisco IOS Zone-Based Policy Firewall
Asymmetric Encryption and PKI
Site-to-Site IPsec VPN
IPsec on a Site-to-Site VPN Using Cisco SDM
IPS Technologies, Cisco IOS IPS Using Cisco SDM
Layer 2 Attacks
Mastering Python – Networking and Security
Learn the ins and outs of scripting in Python and how to work with Python libraries for networking and forensics.
Created by Infinite Skills - High Quality Training
Students: 5908, Price: $49.99
Students: 5908, Price: Paid
In this advanced course, you'll first learn how to create, run, and troubleshoot scripts with Python and then move through specific programming libraries and technologies that allow you to tackle several networking tasks and security measures. No experience is required, although any programming knowledge would be an asset.
You will start with an overview of Python, including how to create and run scripts, use threads, and handle exceptions. From there, Ric will teach you how to network, including how to use the Python libraries for network scripting and develop basic scripts with network functionality. This video tutorial will also cover HTTP programming, security scripting, and forensic scripting. Finally, you will learn about Twisted Python, including the Echo server and HTTP client. Once you have completed the course, you will be fully capable of debugging and security testing using Python, as well as writing Python scripts. Working files are included, allowing you to follow along with the author throughout the lessons.
Ethical Hacking:Network Fundamentals & Network Layer Attacks
Learn Ethical Hacking with Network Security, Sniffing,Subnetting, ARP Spoof, Password Cracking and implement MitM attack
Created by Muharrem AYDIN - Computer Engineer, Ethical Hacking, Cyber Security Expert
Students: 4884, Price: $99.99
Students: 4884, Price: Paid
Welcome all to my cyber security course “Cyber Security: Network Fundamentals & Network Layer Attacks“ course.
To become Ethical Hacker and to learn hacking my Network Layer Attacks and Network Fundamentals course is a perfect start for you. This one gets kind of fun because we get to actually look at data going on the networks like: how to sniff the network and gather information from the network. We’re going to use some tools such as TCP Dump and Wireshark. We will also be doing a deep dive into the Subnetting, ARP Spoofing and MitM attacks and Password Cracking.
This course is highly practical just like my other courses. But which also does not mean that I will neglect the theory. That`s why this course is formed in two parts.
First part, “The Network Fundamentals” is for the beginners to explore the Network Fundamentals but also could be also a good refresher for advanced level students.
In Network Fundamentals section I will introduce you to the fundamental concepts of data networking operation including IP addressing and subnetting, ethernet operation, ports and protocols, and the OSI model . By the end of this course, you will understand the relationship between IP addresses and MAC addresses, as well as the difference between a router and a switch.
After learning theoretical background ( I promise that second part is totally fun ), in Network & Data Link Layer ( Layer 2 ) Attacks part you will first learn how to set up a lab and install needed software to practice penetration testing on your own machine. Then we’re going to use some tools such as TCP dump and Wireshark and we’ll see some attacks and techniques to expand the sniffing surface:
MAC Address Table Overflow attack, also known as MAC flooding,
ARP Cache Poisoning attack, also known as ARP spoof,
DHCP Starvation attack and DHCP spoof,
And VLAN hopping techniques.
The next topic is what else can be done on network devices in penetration tests: Gathering information, cracking passwords of the communication channels, compromising SNMP, etc.
And finally, we’ll check the configurations of network devices: Password creation methods, Identity Management, Access control lists, port security, etc.
This course will take you from a beginner to a more advanced level. Please enjoy and if you have questions do not forget to get in touch with me.
IMPORTANT!!!: This course is created for educational purposes and all the information learned should be used when the attacker is authorized.
Security: Manage Network Security With pfSense Firewall
Use an open source firewall to protect your network. Use features like Failover, Load Balancer, OpenVPN, IPSec, Squid
Created by TetraNoodle Team - REAL KNOWLEDGE. REAL EXPERIENCE. REAL VALUE.
Students: 4570, Price: $99.99
Students: 4570, Price: Paid
According to a recent study conducted by a major Cyber Security firm, less than half the online population understands the term "Firewalls" - or know if they have one enabled on their PC.
Firewalls are even more important in a corporate or work environment. It not only keeps the corporate network safe - but can also optimize traffic routing and provide a whole range of other benefits.
If you are connected to the Internet, you are a potential target to an array of cyber threats, such as hackers, keyloggers, and Trojans that attack through unpatched security holes. This means that if you, like most people shop and bank online, are vulnerable to identity theft and other malicious attacks.
A firewall works as a barrier, or a shield, between your PC and cyberspace. When you are connected to the Internet, you are continually sending and receiving information in small units called packets. The firewall filters these packets to see if they meet certain criteria set by a series of rules, and after that blocks or allows the data. This way, hackers cannot get inside and steal information such as bank account numbers and passwords from you.
Basic firewalls such as the one included in your operating systems, only monitor incoming traffic by default. This may give you a false sense of security. Keep in mind, outgoing traffic, with your credit card information, bank accounts, and social security number is not protected. A good firewall will monitor traffic in both directions. That is, both your incoming data and your outgoing data, keeping your private information safe. In addition to preventing unauthorized access to your PC, it also makes your PC invisible when you're online, helping prevent attempted intrusions in the first place.
Firewalls are one of the most critical parts of a network. It’s the first line of defense that your system has against attacks or unwanted visitors, and it makes all the difference in ensuring your data is protected. pfSense is a highly versatile, open source routing and firewall software. With thousands of enterprises using pfSense software, it is fast the world's most trusted open source network security solution.
pfSense has all of the features you would find in a commercial firewall solution and more, and it is absolutely free! Better yet, you can customize pfSense based on your organization’s requirements and create a unique solution that is perfect for you.
- Do you know what it takes to install and configure a sophisticated firewall?
- How do you scale your firewall from a small home office to a large corporation’s network?
- How do you implement security features like VPN, remote access and corporate web proxy?
These are some of the fundamental problems IT engineers struggle with on a daily basis.
In this course, you’ll learn about pfSense, all of its key features, how you can install and deploy it, as well as the different tasks you can perform.
- You’ll learn about pfSense.
- You will gain an understanding of what pfSense is, its key features and advantages.
- You will learn how to configure pfSense as a firewall and create and manage firewall rules.
- pfSense is capable of working with multiple ISP connections and provide you this redundancy. You will learn to configure and test pfSense for failover and load balancing across multiple WAN connections.
- Besides that, secure remote connectivity is also a critical feature for many businesses and professionals. You will dive into configuring pfSense a free and robust remote connectivity solutions using OpenVPN and IPSec
- Finally, you’ll learn how to configure and integrate pfSense as a Squid proxy server.
if you are serious about architecting, deploying and operating enterprise grade firewalls – then this course is for you.
These IT and security skills are in great demand, but there’s no easy way to acquire this knowledge. Rather than rely on hit and trial method, this course will provide you with all the information you need to get started with your interoperability requirements.
Startups and technology companies pay big bucks for IT engineers and contractors with the talent to secure their infrastructure required for today's ever complex networks. They demand knowledge and experience in these technologies.
When you become skilled at these technologies - you can demand top dollar for your abilities.
- Do you want the skills to be highly sought after?
- Do you want your career to touch cloud 9?
Did you answer, “Absolutely” to that question? If so, then our new training program “Managing Network Security with pfSense Firewall" is for you.
Look, if you're serious about becoming an expert cloud engineer and generating a greater income for you and your family, it’s time to take action.
Let’s do this together!
Nmap: Network Security Scanning Basics & Advanced Techniques
Become a pro at using Nmap to discover computers, services, and vulnerabilities on networks!
Created by Jason Wood - Security Testing Expert and Teacher
Students: 4554, Price: $34.99
Students: 4554, Price: Paid
What is this course about?
You will become an expert using the most powerful and flexible network scanner available. Nmap is the scanner that other scanners are measured against and you will know how to use it from start to finish.
This course will start off with the basics of network scanning with Nmap and move into how you can use it safely and effectively in your network. You will use practical examples and demonstrations to learn how to use Nmap right now!
Why should you take this course?
This course is based on real experiences using Nmap in network security tests on a huge variety of networks. When you are done, you will have the information you need to safely and effectively scan networks for vulnerabilities, services, and hosts. You will start out at the very basics and work your way up to writing your own basic Nmap Scripting Engine (NSE) scripts.
You will learn a core tool that will help you become a more effective:
Nmap is an incredibly powerful tool that you can use to troubleshoot network issues, find unknown network services, and vulnerabilities.
What students are saying:
"Superb. Covers the subject very nicely with no wasted dialog."
- James B.
"You present the ideas well, you have a good voice to listen to, you give clear explanations, your video resolution is excellent, and your reference material is excellent."
- Pamela D.
"Being new to IT and pentesting, this course was both informative and practical. I learned more than I though I would about Nmap and its many many features. Looking forward to more courses offered by this teacher/company. Thank you!"
- Matthew K.
Some of the topics include:
Getting and installing Nmap
Port scanning basics with Nmap
Safe scanning techniques
Performance and tuning considerations
Nmap Scripting Engine
Writing NSE scripts
When you complete this course, you will have gone from the basics of Nmap to how to customize your scans to solve some of the different problems you may be facing with your network.
How does the Internet work & Networking Crash Course
How does the internet work?' for visual learning lovers (Animated Approach)-Prerequisite for Hack, Cyber Security, IT
Created by Ian Frost - Computer Scientist
Students: 3865, Price: Free
Students: 3865, Price: Free
The internet is a part of our daily life and we use it constantly. But what is the internet? Have you ever really thought about it? Have you ever wondered what happens in the background when you enter a web page? If your answer to all these questions is yes, you are definitely looking at the right course. In this course, I assume you don't know anything, and I'm slowly explaining what the internet is. You don't need any prior knowledge to follow this course, since this course tells you everything from scratch.
The internet is actually more than what appears. I think everyone who uses the internet should know its basic features. Everyone who uses the Internet needs to know the ISP. Everyone who uses the Internet needs to know that the internet is actually cables spread all over the world. And in this course, we will go on a journey together and we will look at all these concepts in a very visual way. You will see exactly how the Internet works. And from now on, when you make an operation on the internet, you will feel much more knowledgeable.
Regardless of your age or profession, this course is for everyone. Just enroll and enjoy the videos. You will absolutely understand what the internet is when you finish this course.
Network Security,Firewall, VPN plus CCNA tests
principles of network security,Cyber Security, Firewall technologies , Network address
Created by NewWay Academy - Electrical engineers
Students: 3828, Price: $89.99
Students: 3828, Price: Paid
Hi Our Friend!
Looking to improve your career in Network-Association and being able to Understand the organizational management and access control functions of the Policy Center system?
>> If your answer is big YES, then you're definitely in the right place.
Why this course is Powerful and Unique ?
this course is the first one on udemy platform and on most of educational platforms which can get you from academical information to the real world career as it gets you - step by step - to understand the security policy configuration of the Policy Center system.
This course prepares students for beginning and associate level roles in cybersecurity operations
This course will be 11 sections in 2 parts ,part one will 7 sections and part two will be 4 sections each section can be considered as independent course. So let's begin
At this course :
These tracks would be like a piece of cake to you.
We'll take you from the Scratch to a HIGHER level of Designing and Analysis.
We'll design with each other a complete industrial system used in the practical life.
You'll find questions at end of each section to review the chapter.
My help is always available to you if you get stuck or have a question as I believe we can learn from each other
This is a course that will continue to grow and grow ..
## So don't hesitate and click " Buy Now " button so you can begin on the right path!
Who is the target audience?
Anyone who is interested in Understanding Network Security and VPN.
Electrical Engineering Students.
Anyone who wants to be familiar with network communication.
At the end of this course, you will have ability to:
Understand firewall User Management
Understand firewall VLAN//SA/E1/ADSL/WLAN/3G technology
Understand the concept and functions of VPN
Understand OSI model
Understand TCP/IP principles
Understand the NAT configuration of firewalls
Understand firewall Dual-System Hot Backup basic technology
Understand TCP/IP security issues
Understand the principles of the NAT technology
Understand the application of NAT
Understand key VPN technologies
Understand the classification and application of VPN
CCNA Security Real World Labs – Cisco ASA, Network Security
Identify, lock down, and secure vulnerabilities in a small to medium enterprise branch network - real world training
Created by Marious Kuriata - IT Exam Practice, Network Engineer and Instructor
Students: 3550, Price: $24.99
Students: 3550, Price: Paid
Cisco Security Training is rapidly becoming
some of the most valuable training in the IT field. Passing the exam is
not enough - you need some real world examples and labs. Here we go
then. Learn what you really need to know about Network Security:
VPNs, ASA Firewalls, UTM devices, Wireless security, Radius and Tacacs,
Two-factor authentication... and much more. Now includes ASA FirePower Services.
- NO BORING and useless topics
- 12 hours of real world videos
- When things go wrong... I keep recording
- How to troubleshoot VPNs
- ASA Firewalls (configuration, failover, dual ISPs...)
- UTM devices
- Wireless security (WPA Enterprise)
- DoS and Man-in-the-middle Attacks
- Challenges and GNS3/Packet Tracer labs
- Monitoring Tools and Remote Support Software
- A lot of real world examples
This training is great if you are studying
towards CCNA Sec (210-260) or you are certified already. Comptia
Security+ and Microsoft engineers will benefit as well. If you are
interested in security, this is the right place for you.
This training is unique as it shows you real
world examples and goes beyond CCNA Security topics to cover a lot of
interesting topics that you need to know (e.g. wireless security, remote
support, ASA Failover etc.).
Remember: hiring managers view network security
training as crucial for many IT jobs. It is not enough to pass an exam,
you have to know what you are doing.
Real World Training is what you need to understand different areas of Network Security.
Cisco Network Security Master Class
Learn how to secure Cisco networks
Created by Matt Carey - Cisco CCNA Instructor - IPversity
Students: 3492, Price: $99.99
Students: 3492, Price: Paid
***This course contains all of the lectures from my ASA Firewall Fundamentals course***
In this course you will learn how to maintain integrity, confidentiality, and availability of data and devices.
Master these Cisco Network Security topics
Secure Routing and Switching
Cisco Firewall Technologies
Content and Endpoint Security
Nothing is getting in the way of the network security market. The demand for network security appliances and software continues to grow. The network security market finished the first half of 2016 with a flourish, Worldwide revenue of $2.2 billion was up both sequentially and year over year. For anyone who wants to join the rising network security market, this course is a great place to start.
-"Nice tutorials.. Easy way to learn the security topics. Thanks to the trainer for giving a detailed explanation on each required security topics."
Microsoft Access Networking 2: Maximum Security
Control what users can and can't do in your networked database.
Created by Bruce Myron - Productivity Specialist
Students: 2772, Price: $74.99
Students: 2772, Price: Paid
If you are concerned that network users can, intentionally or by accident, alter or modify settings or code in your networked database, you have come to the right place! Every single step is covered for maximizing the security of the front end/back end databases from the Network 1 course! Having installed Access on dozens of networks, I have had to develop methods to prevent users from being anywhere in the system that I don't want them to be. So why suffer through another phone call for errors that could be completely avoided? I will show you how to eliminate the possibility of them ever happening!
This course shows you how to many techniques for using VBA to control how users log in to and use the database. If you have no familiarity with VBA, you may get frustrated, but every step is illustrated and you are provided with beginning and ending versions of the databases. For some this could be a quick intro into the incredible power of VBA that will convince them that they really should take the Intro to VBA course. For others who have already done all or part of that course, 90% these techniques are totally new and will extend the students knowledge of VBA quite a bit.
Most of the employees in my client businesses have small networks staffed with people who know nothing about Access and they don't want to have to figure out how the ribbon and navigator work, that is why they are always hidden. The systems I build using these techniques let people with zero knowledge of Access get productive on the network quickly. Believe me, there is a huge and growing need for people who can setup easy to use shared database networks like these and there just aren't enough people who know how to do it right!
None of this is theory and you won't find these techniques in any book. The content of this course is a breakdown of the methods I successfully use to administer dozens of networks for my client businesses. I learned a long time ago that you have to automate every routine job that you can, but also you must eliminate downtime for your client and yourself by making silly mistakes. These methods of keeping the network users from even seeing anything they do not need to know about just increase productivity and reduce downtime.
Just take a look at the demo video and see what logging into the finished database looks like. It doesn't look much like Access! Many of the employees in my client businesses do not even know they are using Access (and they really don't care). All they know is it is way easier to get their job done than it used to be!
Follow along as I take you step by step through the modification of the front and back end databases from the Networking Made Simple course and show you tools that you will be using for years to come! This course will show you :
- How to "Encrypt" an Access database.
- How to link to encrypted backend databases from the frontend.
- The basics of creating a User Login table.
- How to create a simple, yet powerful login form.
- How to validate passwords and determine the employee security level.
- How to develop a secure database without locking yourself out.
- How to create a "dialog" login form that cannot be bypassed.
- How to hide or unhide the menus and Navigation Pane.
- How to set database security properties.
- How to create a custom BLANK ribbon!
- How to build in a backdoor for Administrators.
- How to Password Protect all your VBA Code.
- How to Deploy the Updated Database
If you take the time to learn these techniques you will save MANY HOURS of time and avoid wasting time on problems caused by users being where they should not be in the database!
If you want to become the Network Database Guru, click the Take This Course button to get started on this journey to increased productivity and higher value for you in the marketplace. Think of it! In just a few HOURS you know more about securing databases and controlling users on an Access network than almost everyone else!
210-260 Implementing Cisco Network Security Practice Exam
Attend this 210-260 Implementing Cisco Network Security Practice Exam will get a Good Score 80% on Main Exam
Created by Up Strive Hub - Learn Certifying Easily Be Happy :)
Students: 2745, Price: $89.99
Students: 2745, Price: Paid
Which of the following most accurately describes how transparent tunnel? (Select the best answer.)
This allows traffic to exit the same interface, through which entered.
This allows the traffic to flow between interfaces that share the same level of security.
This allows the VPN tunnel to the way through a firewall or NAT device.
This allows the VPN tunnel to determine which traffic flows have to be encrypted.
Which of the following would be most likely to establish in the host, to warn about possible attacks without filtering traffic? (Select the best answer.)
Which of the following forms of malware are usually independent programs that appear to be legitimate application? (Select the best answer.)
IPS blocks network company normal web traffic. Which of the following best describes what determines the IPS? (Select the best answer.)
Which of the following EAP methods do they require digital certificates to be installed on the server, but not on the client? (Select the best answer.)
Which of the following parameters lost or stolen devices are not available for staff when MDM integrated with ISE? (Choose 2 options).
inform the device is lost or stolen
PIN lock the trigger
To cancel the digital certificate of the unit
Ethical Hacking and Network Security from Scratch 2021
Ethical Hacking skills to get ahead. Learn how Hackers hack networks and devices and how to secure them.Learn Kali Linux
Created by Andrei Dumitrescu - DevOps Engineer and Professional Trainer
Students: 2671, Price: $109.99
Students: 2671, Price: Paid
This course IS NOT like any other Ethical Hacking courses you can take online. At the end of this course, you will MASTER the key concepts and you will become an Ethical Hacker and Network Security Expert.
This is a brand new Ethical Hacking and Network Security Applied course launched in April 2020 and it’s updated to teach you the skills required for the future that comes.
Update: November 2020 - Updates to be 2021 ready.
Update: October 2020 - NEW Video: Hacking Linux by running DoS attacks without root access (Fork Bomb)
Update: June 2020 - NEW Section: Anonymity and Privacy (Web Tracking, Onion Routing, Tor, Tor Hidden Services - Dark Web, Deep Web)
Update: May 2020 - NEW Section: Vulnerability Assessment Systems - OpenVAS
Course Launch: April 15, 2020
The world is changing, constantly, and at a fast pace! The technology-driven future in which we’ll live is filled with promise but also challenges. This Ethical Hacking course is really different! You’ll learn what really matters and you’ll get the skills to get ahead and gain an edge.
I won’t teach you how to run an exploit on a vulnerable application that will be patched in a few days and will not work anymore. Instead, I’ll teach you the network security principles that will last for years to come using a practical approach but without neglecting the theory which is the base of a deep understanding.
Do you want to learn a new valuable skill, get hired, get a promotion, or simply prepare for the future that comes? Well, then this course is for you! By enrolling in this course now, you make the best investment in your career!
Given the surge in the cyber-security threats, millions of new jobs will open across the industry and the global digital security spending will exceed hundreds of billions of dollars in the years to come.
After this course, you'll have an in-depth understanding of how hackers think and behave.
This course is for you if you want to learn Ethical Hacking and Network Security applied to the real-world.
It’s specially designed for you whether you have no experience in Network Security, you’ve taken other related courses and you want to level up your skills, or you are coming from other fields like Network and System administration or Programming.
You'll have access to my closed and exclusive online Group in order to provide you with improved, faster, and better support for your course-related questions.
This course is taught by me, a Senior Network Engineer and Professional Trainer. Why should you learn from me?
I'm a Practitioner and an Enthusiast. Welcome to the real world! I entered the Network Security world 15 years ago. I’m not just a random guy that teaches Ethical Hacking and Network Security. Just imagine that during this time I’ve learned and applied more and more almost on a daily basis. And now I’m giving everything to you!
I'm an Educator and I know how to make a Curriculum. I know exactly what is important and what is not. For the last 10 years, I've trained thousands of people on Security, Networking, and Programming.
You'll learn not only some commands and tools but also advanced concepts for real-world jobs that will last. After this course, you'll be an effective Ethical Hacker!
You'll have lifetime access and you can return and look for a specific hack or countermeasure anytime you want. And let's not forget, if you don't like the course, you are covered by a 30-day money-back guarantee, full refund, no questions asked!
The topics covered in this Hands-On Ethical Hacking and Network Security Applied course are:
Setting the Hacking Environment (Kali Linux, Metasploitable, VMs)
Use Kali to Hack Networks and Devices
Hacking Routers and IoT Devices using RouterSploit
Hacking anything with Metasploit
Cryptography In-Depth (Hashes, Digital Signature, Encryption)
Attacks on Hash Algorithms
Full Disk Encryption (Data at rest protection)
GnuPG In Depth
Steganography In Depth
Hiding files in other files
Anonymity and Privacy (Web Tracking, Onion Routing, Tor, Tor Hidden Services - Dark Web, Deep Web)
Cracking Passwords (John & Hydra)
Information Gathering (Reconnaissance)
Nmap & Zenmap, Nmap Scripting Engine (NSE)
arp-scan & net-discover
Hacking Google Searches In Depth
Vulnerability Assessment Systems - OpenVAS
Sniffing Traffic (Wireshark & tcpdump)
Hacking WiFi Networks
Hacking ARP (Ettercap & Bettercap)
Hacking Cisco Devices
Mitigating all attacks presented in the course
Every topic includes many live examples in Kali Linux, a command section, quizzes, slides, and many practice challenges.
The skills you’ll learn will broaden your horizons and could change your life.
Check Point Jump Start: SMB Appliance Network Security
Enforcing Network Security Policy using Check Point Small and Medium Business (SMB) Appliance - Remastered Audio
Created by Check Point Software Technologies, Ltd. - Check Point Software Technologies, Ltd.
Students: 1924, Price: Free
Students: 1924, Price: Free
Check Point's Small and Medium Business (SMB) Appliances are high performance, integrated devices offering optional WiFi and LTE support. Standard Check Point Network Security features such as Firewall, VPN, Anti-Virus, Application Control, URL Filtering, Email Security, and SandBlast Zero-Day Protection are supported.
This course includes these modules:
Logging and Monitoring
Features and Functionality
Security Management Portal
Zero Touch and Reach My Device
VPN and Certificates
Watchtower Mobile App
Cloud Services and SD-WAN
This course is suitable for new Check Point customers with no prior experience configuring or administrating Check Point Network Security products.
Nmap for Ethical Hacking/ Network Security & Bug Bounties
Complete Ethical Hacking with Nmap for Network Security, Penetration Testing & Bug Bounties
Created by Rohit Gautam - Founder & CEO of Hacktify Cyber Security
Students: 1300, Price: $129.99
Students: 1300, Price: Paid
Welcome to Ethical Hacking / Network Security Pentesting & Nmap.
This course starts with the basics of Network Fundamentals to Advance Exploitation.
This course starts with basics with TCP/IP Model and OSI Model and how it can be used in our day to day life. We will also learn TCP, UDP Packets, and Topologies to make our base stronger and then further move on to Ports and Protocols usage with practicals.
This course covers All the Nmap Scan Types with Wireshark Packet Analysis for a better understanding of what’s happening behind the hood.
The course also includes principles for each scan type and its Advantages and Disadvantages for Network Scans.
With this course, we will learn Target Selection Techniques for Host, Subnet Scans & Host Discovery. How to choose large Hosts from files and choose random hosts, also how to exclude them from our scans.
This course will cover port scanning and port knocking which is useful for Penetration Testing & CTF’s
Then we will see How to perform Service Version Detection for vulnerable services for exploitation.
We perform OS Detection and fuzzy scripts to identify the underlying targeted OS
We will also cover Nmap Output Formats to save the output in different formats like HTML and XML. We Willa also see How we can convert XML to CSV format for Recon of Bug Bounty & Penetration Testing.
We will cover Script Scans and use Nmap’s powerful scripting engine for scanning.
Next, we will cover the Nmap Script attack for different categories like Safe, Vulnerability, DOS, Exploit, Not Intrusive, and Boolean Expressions.
Next, we will cover Nmap for reconnaissance for Bug Bounty and Pentesting.
We will cover Nmap Protocols and Exploitation in which we will see protocols like FTP, SSH, HTTP and its exploitation. We will also cover HTTP Basic Auth Exploitation and PUT to RCE using Nmap
Next section, we will see Custom NSE scripts and its anatomy and will also learn How to write your own scripts.
In the next section, we will cover Nmap Timing Parameters and Firewall Analysis to bypass firewalls with Nmap parameters.
Next, we will cover Nmap Timing and Performance to tune Nmap Scans for better results and performance
Next, we will learn how to bypass Timing based firewalls with Nmap
Next section, we will learn How to Bypass IDS and Firewalls with Mac Spoofing, Cloak scan with decoys, Faking TTL and adding Bogus TCP/UDP Checksums.
Next, we will see The Nmap GUI which is the Zenmap
In the last section, we will write our own Python program for scanning and OS Detection based on Nmap.
Here's a more detailed breakdown of the course content:
In all the sections we will start the fundamental principle of How the scan works and How can we perform Exploitation.
1. In Introduction, We will cover What are TCP/IP Models and OSI Models, What is the difference between both and how can we implement it in our day to day life.
We will also learn about network types and fundamentals. We will also see what are network topologies and what are IP and MAC address.
2. In Ports and Protocols, We will cover fundamentals of what are ports and protocols and how do they communicate. We will see protocols like FTP, SSH, DHCP, SSH, Telnet, RDP, HTTP, HTTPS, and their practicals.
In the end, we will see the summary and revision of this section to remember the important protocols & key points.
3. In Nmap Scan Types and Techniques, We will cover most of the commonly used and important scans like TCP, Stealth, Null, UDP, FIN, XMAS, ACK, and Zombie Scan.
We will also see the advantages and disadvantages of each scan type and also see the live Packet Analysis to understand what is happening behind the hood and how all the scans differ from each other.
In the end, we will see the summary and revision of this section to remember the important Scan Types & key points.
4. In Nmap Target Selection and Techniques, We will cover How can we perform a Host Scan using Nmap. We will also see How to perform a Subnet Scan & Host Discovery to identify Live Hosts.
We will also see the difference between Netdiscover and Nmap Host Discovery and the difference between the output.
Next, we will see, How can we scan a large number of Hosts from files using a file input scan.
We will learn how to exclude hosts from a subnet scan or a File input scan if they are blacklisted or whitelisted into a network.
We will also cover How can we Bypass Windows Firewall Rule with No Host Discovery and successfully identify the information about the target.
5. In Nmap Port Scan and Techniques, We will cover How can we perform a Port Scan using Names and numbers with Nmap. We will also see How to identify only open ports perform a Fast Port Scan.
We will also see Port Knocking of hidden ports, which is useful in Penetration Testing and CTF’s. We will also see How can we scan ports without randomization and in a sequential manner along with scanning of only Top Ports.
In the end, we will see the summary and revision of this section to remember the important Port Scan Types & key points.
6. In Nmap Service version Detection, We will cover How can we perform a Service Version Detection Scan using Nmap to identify running older services on the target systems
We will also perform Service Detection with Light Intensity to All to find the exact versions of the target systems.
In the end, We will also see the Service Version trace to identify how each packet is sent and How Nmap is able to identify services based on fingerprints.
7. In Nmap OS Detection, We will cover How can we perform an OS Detection Scan using Nmap to identify Operating System and their versions installed on the targets.
We will also perform OS Detection Fuzzy scripts to find the exact versions of the OS of the target systems. We will also see the OS Detection Scripts for better identification of results.
8. In Nmap Output Formats, We will cover How can we save the output from the Nmap Scans to specific formats. This is useful as we save the output and later check if the installed software on the targets have been outdated or not for successful exploitation.
We will save the output in different formats like XML, HTML, Script Kiddie, and Greppable.
We will also see How we can convert XML output to HTML for better visual identification of hosts using xsltproc.
We will also save our XML output to CSV using python parser for bug bounty reconnaissance.
In the end, we will see how one command can save all the output types of all the formats.
9. In Nmap Script Scan, We will cover Nmap’s powerful feature its NSE engine which contains powerful and handy scripts to run on the targets. We will become familiar with the usage of scripts, help, and updating the database.
We will see how to use NSE arguments to run scripts. We will also see how you can use script sets to perform mass script scanning against the targets.
10. In Nmap Script Attack Categories, We will see different types of script categories and run all of them against the target.
We will cover scripts of categories - Safe, Vulnerability, DOS, Exploit, Not Intrusive.
We will also cover how you can run multiple script categories with the help of Boolean Expressions in Nmap.
11. In Nmap for Reconnaissance, We will see different ways to perform recon for Pentesting and Bug Bounty Hunting.
We will cover trace-route scans, geo resolution of IP’s, IP information, and get sensitive results from DNS Bruteforce
Also, We will learn how can we find live hosts on IP ranges. We will also cover whois scan, Robots scan to find information related to targets.
Next, We will see how can we identify web application firewalls on domains, So we do not get blocked by running our scans and payloads. We will also cover How can find vulnerable targets from Shodan using Nmap. We will also see how can we scrape emails from the target for enumeration and generate a sitemap for the target.
12. In Nmap Protocol Exploitation, We will see different types of exploitation for different protocols like FTP, SSH, DNS, HTTP Basic Auth.
We will also cover how can we exploit HTTP Methods to achieve Remote Code Execution using Nmap.
We will also see How can we perform Heart Bleed Scan using Nmap against any target, also will cover HTTP Open Proxy Enumeration to find any open proxies.
In last, We will see How can we perform Zone Transfer to dump all the Zone Records of master and slave servers
13. In Nmap Web Exploitation, We will see how can we perform HTTP headers and HTTP Security Headers scan to identify targets vulnerable.
We will also cover famous web-based vulnerabilities like - XSS, SQL Injection, CSRF.
In the end, we will also see to find targets vulnerable to Default Account Exploitation and IIS Web server name disclosure.
14. In Nmap Custom NSE Scripts, We will see Anatomy of Nmap’s powerful Nmap scripting engine.
In the end, We will also learn How to write our own first NSE script.
15. In Nmap Timing and Performance, We will see what are Nmap Insane Scan, Aggressive Scan, Normal Scan, Polite Scan, Sneaky Scan, and Paranoid Scan.
Next, We will see each of their breakdown using the Wireshark network analyzer.
16. In Nmap Time Based Firewalls Evasion, We will see how can a System Administrator can block Nmap Insane Scan and How can we bypass it using 2 tricks.
We will see How Administrator can block Aggressive Scan, Normal Scan, Polite Scan, Sneaky Scan, Paranoid Scan, and How can we bypass all of them by tuning our scans.
17. In Nmap Firewall & IDS Bypass, We will see how can a bypass targets with Cloak Scans and Decoys.
We will see How to spoof Mac address to hide our identities, How to change our network interfaces for scanning, How to change the source port numbers for scanning, How to send Fake TTL, How to relay proxies, How to append random data with packets, How to send Bogus TCP/UDP Checksum,
How to perform a Fragment scan to send invalid packet sizes, and perform MTU Scans.
18. In Zenmap The Nmap GUI, We will see the graphical user interface version of Nmap.
We will perform the installation of the GUI Version and learn the usage and roadmap of zenmap.
19. In Nmap with Vulscan Automation for Penetrating Testing, We will learn the setup of vulnscan with Nmap for automatic vulnerability scanning and turn Nmap into a powerful vulnerability scanner.
We will enumerate vulnerabilities based on CVE databases from different websites.
20. In Nmap with Python for Penetrating Testing, We will learn the setup of python and will learn to write our own python program for a network scanner.
In the end, we will write a python program for port scanning of targets to identify the port state as open or closed.
With this course, you get 24/7 support, so if you have any questions you can post them in the Q&A section and we'll respond to you as soon as possible.
This course is created for educational purposes only and all the websites I have performed attacks are ethically reported and fixed.
Testing any website which doesn’t have a Responsible Disclosure Policy is unethical and against the law, the author doesn’t hold any responsibility.
Ethical Hacking and Networks Security (2021)
Get to know the ins and outs of cyber security and industry best practices to configure and secure IT networks.
Created by Hackademy _ - Learn, explore and share.
Students: 1068, Price: $89.99
Students: 1068, Price: Paid
This curse sums up more than 10 years working on IT and the content of a master degree in information technologies security.
The topics are:
CIA triad, types of attacks and security mechanisms
Security concepts and methodologies (Terminology, Security properties and case study of a Risk Management plan)
Cryptography (Introduction, Historical background, principles and how to stay anonymous on the Internet)
Security benchmark (Black-box and white-box approach to exploit and secure a system)
Formulary hacks (Code a vulnerable form, exploit and secure it)
Security in email (PGP) and web servers (X.509)
Network firewall with Snort integration
Remote security analysis and assessment
Build a dedicated virtual server (Backup your data, including Time Machine, run your Virtual Machines among other perks)
Extra chapters about web server sandboxes and the Wannacry ransomware, will be updated as I see fit our you demand.
Even if you are already a system administrator or a newbie you are most likely to find something new, as I did previously to start this.
If you have any question or doubt just send me a message.
All questions and feedback will have a response within 24 hours, sign up today and start learning now.
This course is constantly reviewed and updated with new lessons.
More information available at hackademy tk
Learning Network Technology and Security
Learn how to secure and protect your network effectively. An essential course for all system administrators
Created by Infinite Skills - High Quality Training
Students: 1009, Price: $49.99
Students: 1009, Price: Paid
An Essential Course For All System & Network Administrators
This Network Technology and Security Fundamentals training course from Infinite Skills teaches you how to secure and protect information as it flows across an enterprise network. This course is designed for users that are working in or looking to move up in the field of Information Technology.
You will start by reviewing the Open Systems Interconnect (OSI) model, then jump into learning the TCP/IP suite of protocols. The course will then cover transmission media and technologies. This video tutorial will also look at the devices that make up the network infrastructure, including firewalls, routers, Virtual Private Networks (VPNs), client systems, and virtual machines. Next, you will learn about wireless networks, devices, and security. Finally, the course will cover the various types of attacks on networks, including browsing attacks, information theft, and attacks on cell phones.
Once you have completed this computer based training course, you will be fully capable of securing and protecting an enterprise network. Working files are included, allowing you to follow along with the author throughout the lessons.
Network Hacking and Security
Basic to advance level course for IT Security aspirants
Created by infySEC Global - Head - Cyber Security Research
Students: 888, Price: $49.99
Students: 888, Price: Paid
Hi and welcome to our Network hacking and security course.
In this course, we will teach you how wired and wireless network attacks are performed in a simulated/test environment in an ethical way. This course helps the network security professional to mitigate these attack using the recommended solution at the end of each module.
You will be encouraged to practice what you have learned in a simulated environment via our practice "Audio Visual Exercise" session.
We have designed this course to enable those aspiring to enter the information security field to learn core concepts on network hacking in order to safeguard a network infrastructure. By the end of this course you will be familiar with how various types of wired and wireless network hacks are performed and you will be fully equipped to test and safegaurd a network infrastructure against various real time attack vectors.
This course has been specifically designed by a team of information security researchers who are acknowledged experts in their field.
This course has been designed to accelerate your learning process through the use of creative animations and easy to understand voice over narratives. Complex hacking concepts have been broken down into easy to understand modules.
Together, our team will walk you through the entire learning process step by step.
This course is perfect for existing network architects, network administrators, network security professionals as well as anybody who is passionate about developing their skills in the field of internet security. No prior training is required to take this course as we will start with the basics. We welcome anyone with a thirst for learning.
We look forward to having you join us. In the meantime, please feel free to take a look at our demo tutorial and exercise before you purchase the full course.
Networks Security from Scratch to Advanced
Computer Networks Security Technologies and Tools for Network Admins and Cyber Security Officers
Created by Nadeere Binbila - اعمل كمسوق الكتروني
Students: 792, Price: $89.99
Students: 792, Price: Paid
Is it accurate to say that you are keen on CCNA accreditation? On the off chance that indeed, at that point this is the ideal course for you. Here you get all the fundamental to propel ideas of Networking. What's more, toward the part of the arrangement you get enough certainty to clear CCNA 200-125 Exam. Here we clear every one of the points well ordered. In the event that you don't have any past learning in systems administration that is totally OK.
In this Course Ms. Pinki Chavra Teach you CCNA Course Step by step. She has 12+ Years of involvement in Computer Network.
The substance are completely invigorated and we include and update new video content every single week.
In this course you get hands on understanding on, for example, VLAN's, VTP, STP, PortFast, EtherChannel, Inter-VLAN and so on. We talk about a ton of Key subject of systems administration like IPv4, IPv6 and so forth.
On the off chance that you are a freshers or have some understanding yet need to fabricate your bearer in the field of Networking then this is the ideal course for you !
ICS/SCADA Network Security Monitoring (NSM)
Hands on exercises with open source tools and resources available for ICS/SCADA NSM.
Created by Ed Galarza - ICS/SCADA Cyber Security Instructor
Students: 757, Price: $99.99
Students: 757, Price: Paid
Our world is growing more and more dependent upon technology and systems that monitor and control industrial processes. The electric power grid, water and sewage systems, oil and natural gas pipelines, and many more critical infrastructure utilize Industrial Control Systems/Supervisory Control and Data Acquisition (ICS/SCADA) systems. ICS/SCADA is used to monitor and control these infrastructure processes. One way we can defend these systems is by implementing Network Security Monitoring (NSM) within ICS/SCADA environments. This ICS/SCADA Network Security Monitoring (NSM) course will provide you with a strong foundation in some of the open source tools that are available to implement ICS/SCADA NSM within your ICS/SCADA environments! You will learn about various topics such as: What is Security Onion, and how can it be used for ICS/SCADA NSM? What open source tools and resources are available to implement ICS/SCADA NSM? How do I update my Snort rules to implement ICS/SCADA NSM? What are some Snort rules that can be used to detect the TRITON SIS Malware? What other TRITON SIS Malware resources are out there? etc...
Fundamentals of Network Security
Network+ and Security+ based training with a Nessus Lab
Created by Corey Charles - Security+, Qualys Vulnerability Management Specialist, MSIS
Students: 535, Price: $89.99
Students: 535, Price: Paid
By the end of this course you will be fully aware of the wired and
wireless computer networks basics, devices, network based vulnerabilities and protocols in a
step-by-step pace. You will also reach the professional level
in networks security in terms of concepts, technologies, and tools. The
course requires no background or pre-requisite, yet you will be able to
understand all the up-to-date terminologies in the networks security
during the lectures.
This course is organized as follows:
Understanding the OSI Model
The functionality of the OSI Model
Data Encapsulation and De-Encapsulation
Section 2 Review Quiz
The functionality of the Internet Protocol
Introduction to the Internet Protocol
IP Address Classes
Reserved IP Addresses
Public and Private IP Addresses
Section 3 Review Quiz
Transmission Control Protocol
The functionality of Transmission Control Protocol
Introduction to Transmission Control Protocol
TCP Three-Way Handshake
Section 4 Review Quiz
User Datagram Protocol
The functionality of the User Datagram Protocol
Introduction to the User Datagram Protocol
TCP and UDP Ports
Address Resolution Protocol
Host-to-Host Packet Delivery Using TCP
Section 5 Review Quiz
TCP Session Hijacking
Security+ Certification – Network Security Domain
Pass the Network Security Domain section of the Security+ exam and become a part of the growing Cyber Security industry.
Created by Chad Russell - Join the Cyber Security Industry!
Students: 474, Price: $89.99
Students: 474, Price: Paid
This course is for beginners and IT pros looking to get certified and land an entry level Cyber Security position paying upwards of six figures! There are currently over a million Cyber Security job openings global and demand is greatly outpacing supply which means more opportunity, job security and higher pay for you!
The Security+ exam covers six domains and this course focuses on the first domain which is 'Network Security'.
A foundational understanding of Networking and TCP/IP is a must in order to even begin talking about security so we will cover basic networking and TCP/IP initially to get you on a firm footing.
Unconventional IT & Network Security – Innovative Approaches
Be As Secure as you can be
Created by Anil Singh - BPM Consultant
Students: 469, Price: Free
Students: 469, Price: Free
Welcome to the Unconventional IT Security Approach Course, this course is based on our real life production security issues we faced as part of building and running a commercial cloud Platform. Conventional means of security simply do not cut it in this every changing threat landscape, these tutorials will help you in being as secure as you can be.
Fortinet NSE 7 Network Security Architect Practice Test
Fortinet Exam NSE7 Practice - Fortinet Network Security Expert
Created by Khiem Bui - CEH, CHFI, CEI, Security+, TOGAF, CISA, CISM and 2xAWS
Students: 256, Price: $19.99
Students: 256, Price: Paid
Fortinet NSE 7—Enterprise Firewall 6.4 Exam
The Fortinet NSE 7—Enterprise Firewall 6.4 exam is part of the NSE 7 Network Security Architect program, and recognizes the successful candidate’s knowledge and expertise with Fortinet solutions in enterprise security infrastructure environments.
The exam tests applied knowledge of the integration, administration, troubleshooting, and central management of an enterprise firewall solution composed of FortiOS 6.4, FortiManager 6.4, and FortiAnalyzer 6.4.
The Fortinet NSE 7—Enterprise Firewall 6.4 exam is intended for network and security professionals who are responsible for the design, administration, and support of an enterprise security infrastructure composed of many FortiGate devices.
Exam name Fortinet NSE 7—Enterprise Firewall 6.4
Exam series NSE7_EFW-6.4
Time allowed 60 minutes
Exam questions 35 multiple-choice questions
Language English and Japanese
Scoring Pass or fail, a score report is available from your Pearson VUE account
Time required between attempts: 15 days
Successful candidates have applied knowledge and skills in the following areas and tasks:
*System and session troubleshooting
- Perform initial configuration
- Implement the Fortinet Security Fabric
- Security Fabric
- FortiOS architecture
- Traffic and session monitoring
- High availability
- Central management and analysis using FortiManager and FortiAnalyzer
- FortiGuard l Web filtering l Antivirus l Intrusion Prevention System (IPS)
*Routing and Layer 2 switching
- Static routing
- Dynamic routing: OSPF, Border Gateway Protocol (BGP)
- Autodiscovery VPN (ADVPN)
You should be familiar with the design, administration, and support of an enterprise security infrastructure using FortiGate devices.