Best Pfsense Courses

Find the best online Pfsense Courses for you. The courses are sorted based on popularity and user ratings. We do not allow paid placements in any of our rankings. We also have a separate page listing only the Free Pfsense Courses.

The Complete Cyber Security Course : Network Security!

Volume 2 : Network Security, WiFi Security, WiFi Hackers, Firewalls, Wireshark, Secure Networking. + Password Managers

Created by Nathan House - Leading Cyber Security Expert

"]

Students: 131586, Price: $119.99

Students: 131586, Price:  Paid

Become a cyber security specialist.

After this course, you will be able to
discover security vulnerabilities across an entire network, by using network hacking techniques and vulnerability
scanning
.

You will be able to architect your network for maximum security and
prevent local and remote attacks. We also cover the use of custom router
firmware to provide you with better network security services.

You will understand
the various types of firewalls that are available and what threats each help
mitigate.

Including layer 4 firewalls like Iptables on Linux and PF on MacOS and BSD. Virtual
firewalls, host-based firewalls and application based firewalls like Pfsence.
We cover firewalls on all platforms including Windows, Mac OS X and Linux for
all types of use scenarios.

We explore in detail wireless security, the configurations
that are required for maximum security and why. How Wi-Fi is hacked and how to
mitigate those attacks. Covering everything from encryption weaknesses to evil
twins, RF isolation, and Wi-Fi crackers.

You will master network monitoring to discover and identify potential hackers,
malware and other adversaries that might be lurking on your network. Using
tools like Wireshark, Tcpdump and Syslog.

We then move away from network security and
onto the details of how we are tracked
online
by corporations, nation-states your ISP and others. You will
understand the techniques used like zombie super cookies, browser
fingerprinting and how browser profiling works so third parties can establish
who you are online.

We look at search engine privacy - and how to mitigate the
tracking and privacy issues of search engines and their associated services.

Browser
security
- We cover one of the largest risks
online, the browser. The doorway into your system. How to best reduce the
attack surface of the browser and harden it for maximum security and privacy. A critical consideration for reducing your risk.

Finally you will fully understand how to
best use methods of authentication
including passwords and multi-factor authentication - soft tokens and hard
tokens

The best password managers to use and why. How passwords are
cracked, and how to mitigate the cracking.

This is volume 2 of 4 of your complete guide to cyber security privacy and anonymity.  

The RedTeam Blueprint – A Unique Guide To Ethical Hacking

Learn what it really takes to be an Ethical Hacker for Silicon Valley Companies. The TRUE Blueprint to Ethical Hacking.

Created by Brandon Dennis - Silicon Valley Hacker and Lead Instructor @ RedTeam Nation

"]

Students: 38439, Price: $19.99

Students: 38439, Price:  Paid

Welcome to the FIRST complete guide to Ethical Hacking! A lot of other Ethical Hacking or Security courses will just teach you how to hack or attack target systems. Learning just this aspect of Ethical Hacking WILL NOT GET YOU THE JOB IN THE REAL WORLD! The RedTeam Blueprint was designed and developed by Silicon Valley Hackers to actually land you the hacking job or penetration testing!

The reason the course was designed in this unique way is due to the real world Ethical Hacking Experience at Silicon Valley Company's by Brandon Dennis. With countless years of hiring Ethical Hackers, building out Security/Ethical Hacking Teams and developing new attack techniques Brandon is uniquely qualified to provide a full top to bottom course on what it REALLY takes to get into the field of Ethical Hacking.

After completing this course you will have not only a solid understanding of Ethical Hacking but also how Teams work at Enterprise Scale, working with Executives and smashing the Interview. This course has 8+ hours of hands on training as well as a realistically usable portfolio you can bring to job interviews.

Information Security is an ever growing field and with new jobs opening everyday but not enough professionals to fill them is creating a massive demand. With the RedTeam Blueprint you will be able to fill this gap! As a RedTeam Nation Student you will have the skills required to not only go into Ethical Hacking but into any field of Information Security available!

We teach not only the ethical hacking skills required but also the other 50%! Below are just some of the subjects you will learn.

  • Building out a Red Team at Enterprise Silicon Valley Scale

  • Skills to manage the Red Team as well as internal programs that can chance how the organization works

  • Networking

  • Windows Operating System

  • Linux Operating System

  • Operating System Internals (Memory, Stack, Heap, Kernels)

  • Programming (Assembly & Python)

  • Passive & Active Reconnaissance

  • Attack and Create Active Directory Infrastructure

  • Custom Exploitation

  • Post Exploitation

  • Breaking Jail Shells

  • Abusing a Compromise to Lead to large scale attacks

  • Password Cracking

  • Build out a sophisticated in home lab

  • Building a Personal Security Brand

  • Building a Portfolio

  • Job Hunting the Silicon Valley Way

  • Smashing the Job Interview

These are only SOME of the topics covered in this course. Of course you will receive 24 hour support via Q/A of the course as well as access to our Private Student Only Facebook Group with access to the instructors.

Don't wait! Take your career to the next level with the RedTeam Blueprint. 

Security: Manage Network Security With pfSense Firewall

Use an open source firewall to protect your network. Use features like Failover, Load Balancer, OpenVPN, IPSec, Squid

Created by TetraNoodle Team - REAL KNOWLEDGE. REAL EXPERIENCE. REAL VALUE.

"]

Students: 4570, Price: $99.99

Students: 4570, Price:  Paid

According to a recent study conducted by a major Cyber Security firm, less than half the online population understands the term "Firewalls" - or know if they have one enabled on their PC.

Firewalls are even more important in a corporate or work environment. It not only keeps the corporate network safe - but can also optimize traffic routing and provide a whole range of other benefits.

If you are connected to the Internet, you are a potential target to an array of cyber threats, such as hackers, keyloggers, and Trojans that attack through unpatched security holes. This means that if you, like most people shop and bank online, are vulnerable to identity theft and other malicious attacks.

A firewall works as a barrier, or a shield, between your PC and cyberspace. When you are connected to the Internet, you are continually sending and receiving information in small units called packets. The firewall filters these packets to see if they meet certain criteria set by a series of rules, and after that blocks or allows the data. This way, hackers cannot get inside and steal information such as bank account numbers and passwords from you.

Basic firewalls such as the one included in your operating systems, only monitor incoming traffic by default. This may give you a false sense of security. Keep in mind, outgoing traffic, with your credit card information, bank accounts, and social security number is not protected. A good firewall will monitor traffic in both directions. That is, both your incoming data and your outgoing data, keeping your private information safe. In addition to preventing unauthorized access to your PC, it also makes your PC invisible when you're online, helping prevent attempted intrusions in the first place.

Firewalls are one of the most critical parts of a network. It’s the first line of defense that your system has against attacks or unwanted visitors, and it makes all the difference in ensuring your data is protected. pfSense is a highly versatile, open source routing and firewall software. With thousands of enterprises using pfSense software, it is fast the world's most trusted open source network security solution.

pfSense has all of the features you would find in a commercial firewall solution and more, and it is absolutely free! Better yet, you can customize pfSense based on your organization’s requirements and create a unique solution that is perfect for you.

  • Do you know what it takes to install and configure a sophisticated firewall? 
  • How do you scale your firewall from a small home office to a large corporation’s network? 
  • How do you implement security features like VPN, remote access and corporate web proxy?

These are some of the fundamental problems IT engineers struggle with on a daily basis.

In this course, you’ll learn about pfSense, all of its key features, how you can install and deploy it, as well as the different tasks you can perform.

  • You’ll learn about pfSense
  • You will gain an understanding of what pfSense is, its key features and advantages.
  • You will learn how to configure pfSense as a firewall and create and manage firewall rules.
  • pfSense is capable of working with multiple ISP connections and provide you this redundancy. You will learn to configure and test pfSense for failover and load balancing across multiple WAN connections.
  • Besides that, secure remote connectivity is also a critical feature for many businesses and professionals. You will dive into configuring pfSense a free and robust remote connectivity solutions using OpenVPN and IPSec
  • Finally, you’ll learn how to configure and integrate pfSense as a Squid proxy server.

if you are serious about architecting, deploying and operating enterprise grade firewalls – then this course is for you.

These IT and security skills are in great demand, but there’s no easy way to acquire this knowledge. Rather than rely on hit and trial method, this course will provide you with all the information you need to get started with your interoperability requirements.

Startups and technology companies pay big bucks for IT engineers and contractors with the talent to secure their infrastructure required for today's ever complex networks. They demand knowledge and experience in these technologies.

When you become skilled at these technologies - you can demand top dollar for your abilities.

  • Do you want the skills to be highly sought after? 
  • Do you want your career to touch cloud 9?

Did you answer, “Absolutely” to that question? If so, then our new training program “Managing Network Security with pfSense Firewall" is for you.

Look, if you're serious about becoming an expert cloud engineer and generating a greater income for you and your family, it’s time to take action. 

Let’s do this together!

pfSense Fundamentals – Secure Networks With pfSense Firewall

Learn to secure your home or business with the free, feature rich, enterprise grade pfSense Firewall

Created by Ted LeRoy - Enterprise Security Architect - Online Instructor

"]

Students: 1875, Price: $79.99

Students: 1875, Price:  Paid

==========================Student Reviews======================

This is a great course for anyone needing to understand the pfSense firewall system. It was well worth both time and money. The presentation of the instructor was very professional, well thought out and the demonstrations were extremely relevant and easy to follow. -- David S. ★★★★★

This an excellent course, i started knowing nothing. Now I am no longer the one i was before starting and every topic is well organized... Hats off Ted, The instructor Ted made it become very easy for someone to learn. By the end of the course i feel very happy and ready to continue learning and keep practicing what I've learned from you. -- Hermann S.F. ★★★★★

Excellent overview, and quick initial setup of pfSense. Good coverage on mentioning you can set it up in monitor mode to observe your traffic for a few weeks, after basic rules are in place; then review the logs to put in place any remaining necessary rules. I've studied firewalls before; but first foray into pfSense. I like it. -- Kevin S. ★★★★★

=============================================================

pfSense is a full featured, open source firewall specific BSD build. You can download an image for free, and install it on your own hardware, or in your virtualized environment of choice, or purchase a very reasonably priced pre-configured device.

Even though pfSense is built on FreeBSD, you don't have to know BSD or Linux to manage your firewall. You are encouraged to do everything you need through the browser based Graphical User Interface (GUI).

As with all Udemy courses:

  • You have a 30 day, no questions asked, money back guarantee if you're not fully satisfied with the course.

  • You have lifetime full access to the course and all updates and additions.

In this course, you'll learn:

  • The fundamentals of what a firewall is

    • Overview

    • Interfaces

      • Outside (Untrusted)

      • Demilitarized Zone (Medium Trust)

      • Internal (Trusted)

    • Stateful Packet Inspection (SPI)

    • Application Layer Firewall

  • Why you need a firewall

  • What pfSense is

    • The operating system it's built on

    • Pro's and con's of open source

  • The main features included with pfSense

    • Overview

    • Management through the Web based Graphical User Interface (GUI)

    • Firewall

    • Network Address Translation (NAT)

    • User Management

  • Configure pfBlockerNG

    • Installing pfBlockerNG

    • Which traffic to analyze for pfBlockerNG

    • Configuring pfBlockerNG

  • Install Snort IDS/IPS

    • Install Snort

    • Choose Snort Rule Sets

    • Download Rule Set updates

    • Assign Rule Sets to interfaces

  • Install Suricata IDS/IPS

    • Install Suricata

    • Choose Suricata Rule Sets

    • Download Rule Set updates

    • Assign Rule Sets to interfaces

  • Configure a DMZ

    • Create a DMZ

    • Configure Firewall Rules

    • Configure Port Forwarding Rules

    • Configure Inbound Rules (HTTP)

    • Configure Snort or Suricata to protect DMZ

    • Test to Ensure Protection Works

  • Maintaining Your Firewall

    • Backing up and restoring from backup

    • Updating

    • Troubleshooting Issues

Dive in and learn pfSense today!

Mastering pfSense

Get hands on experience and learn about open source firewall pfSense. Learn by doing and boost your technical skills.

Created by Jay Singh - Computer and Network Systems Engineer

"]

Students: 1845, Price: $24.99

Students: 1845, Price:  Paid

This course provides you clear understanding and demonstration of world's most trusted open source firewall in the virtual environment, where you get your hands dirty with real world scenarios in virtual environment. Testing is done after every configuration with clear explanation where possible.

pfSense is just not a firewall, Join this course to levarage your knowledge and find more about different features offered by pfSense. Apart from firewall feature, PfSense can act as a Router, DHCP Server, DNS Server, VPN Server, Captive Portal and it has much more to offer through third party packages.

Course is tailored for the beginner IT enthusiastics  or anyone would like to learn about open source pfSense firewall.

I commit with regular updating and answering all the questions related to this course.

Disclaimer: Please note that this course is a beginners level course, and created in a virtual and non-production environment. Please test all the required security measures before deploying any demonstrated settings in a production environment.

pfSense for Dummies : Setup and Configure your own firewall

Learn to Setup pfSense Open Source Firewall, Configurations, Captive Portal etc in an Actual as well as Virtual Scenario

Created by Abhilash Nelson - Computer Engineering Master & Senior Programmer at Dubai

"]

Students: 1158, Price: $99.99

Students: 1158, Price:  Paid

Learn to Setup pfSense Open Source Firewall, Configurations, Captive Portal etc in an Actual as well as Virtual Scenario.

Hello..  This is Abhilash Nelson and welcome to my new course 'pfsense Beginner to Master'.

Lets see what are the topics that are included in this course..

In session 1 & 2 , we will see what exactly is a firewall. The concept behind a firewall. Why should we use a firewall in our network and why are we choosing pfsense as our firewall. The specialities, the features of pfsense.

In the third session we will see how we can download pfsense Community Edition from the website and then create a bootable USB drive using the downloaded file so that we can use this bootable USB drive to install pfsense in our computer.

In the next session, we will see how we can install an additional ethernet card in your PC, so that we can have the incoming connection coming in through the first ethernet card and the outgoing connection going out through the second ethernet port of our computer

In the next session we will have a discussion about the network plan that we are going to include in our actual network scenario and the devices that we are going to use in the network and how we can make the connections between the devices that we are going to include in our actual network scenario.

From the session 6 to session 11, we will see how we can boot using our bootable USB drive, then go ahead with installing pfsense in our computer. We will also setup the WAN network as well as the LAN network so that we can have the internet connection, coming from the WAN network, going through our pfsense and into our Local Area Network, that is our LAN network.

And the problem with this kind of configuration is that if you want to do a quick learning of pfsense, it will not be a practical option to set all these gadgets and set all these network. The exact lab set up that we had here for the actual configuration, we are going to do it in the virtual environment.

From session 12 to 17 we will try to setup the exact scenario that we had in our actual Lab into our virtual environment using VirtualBox. We will be downloading VirtualBox from the Oracle website. We will also be downloading pfsense Community Edition. Then we will be downloading Ubuntu which is our client computer and we will be installing both pfsense as well as Ubuntu into our virtual machines so that we can have the pfsense as well as a client computer.

From sessions 18 to 20, we will discuss and explore the most commonly used pfsense console options and configurations. We will also see the Web Wizard that will appear for the first time you install and also how you can configure the Web Dashboard to your liking.

From sessions 21 till 27, we will see the advanced system configuration options and administrative options. We will also see package manager by using it you can install new packages and get the new features and also we will see the gateways, where you can configure the gateway options and User Manager where you can edit, delete, activate and de-activate new users. We will also see the interface options and interface assignments. And port forward which allows you to forward port using your firewall.

In session 28 and 29, we will setup and configure captive portal, which is one of the coolest functionalities available with pfsense. We can setup it for institutions like hotels or schools, where you can make the user login to the system using a username and password. Or you can also create voucher codes. The user can use the voucher code, or else he can use the username and password to login to the system so that he can access metered internet connection.

In session 30, we will see miscellaneous pfsense options like  load balancing. We will also see an important to take backup of your configuration and restore it using the web interface as well as using the command line interface.

In sessions 31 and 32, we will implement website blocking functionality for the whole network using pfsense plugin called pfblocker, where you can block from a list of websites and also you can include individual domain names and block that particular domain name in the network.

So overall, this course will be a great place to start your journey with pfsense firewall. We will be also be providing you with a course completion certificate which you can include in your Network Administration portfolio and will add more weightage to your portfolio.

So see you soon in the class room. Have a great time. Bye Bye !!

Contents Index:

  1. Explaining Firewall Concepts

  2. Advantages of pfSense

  3. Downloading pfSense and Creating Bootable USB Drive

  4. Installing Additional Network Card in PC (Actual Lab Scenario)

  5. Making Network Connections : WAN - pfSense - LAN (Actual Lab Scenario)

  6. Installing pfSense  (Actual Lab Scenario)

  7. DHCP - IP Address Assignment & Resolving Conflicts  (Actual Lab Scenario)

  8. Testing Connectivity and Troubleshooting   (Actual Lab Scenario)

  9. Virtual Box pfSense - Defining Network Plan

  10. VirtualBox pfSense - Downloading Prerequisites

  11. VirtualBox pfSense - Pre-installation Configuration

  12. VirtualBox pfSense - Installation

  13. VirtualBox Ubuntu Installation

  14. pfSense - Console Options - Quick Overview

  15. pfSense - Web Wizard

  16. pfSense - Web Dashboard

  17. pfSense - System Advanced Options Quick Overview

  18. pfSense  System Options  - Part 1 Cert-Manager, General Sync  & Package Manager

  19. pfSense  System Options - Part 2 Routing, updates  and User Management

  20. pfSense - Interfaces

  21. pfSense - Firewall - Aliases and Port  Forwarding, Rules, Schedules, Traffic Shapper, Status Logs

  22. pfSense - Captive Portal - Part 1 - Configuration with Custom Guest Login Page

  23. pfSense - Captive Portal - Part 2 - Voucher Based Login

  24. PfSense - pfBlock - Website Blocking and Restrictions - Part 1

  25. PfSense - pfBlock - Website Blocking and Restrictions - Part 2

Hands-On pfSense 2.x for Firewalls and Routers

Elite network security with open source software!

Created by Packt Publishing - Tech Knowledge in Motion

"]

Students: 459, Price: $89.99

Students: 459, Price:  Paid

pfSense is an open-source security suite based on OpenBSD, the world's most secure operating system. It is used by top-notch network security professionals to provide highly versatile network control complete with advanced traffic routes, firewalls, and monitoring tools.

This course will teach you how to install and configure core pfSense services such as firewalls, routing, and network segregation. You will also learn how to successfully secure, monitor, and maintain your networks with pfSense. Advanced topics include custom firewall rules, automated blocking, virtual private networks, and more!

We will create a virtual network with two secure LANs, a DMZ and a public Internet connection with robust security features. By the end of this course, you will be confident using pfSense to secure physical and virtual networks using the industry's most exciting network perimeter defense system.

About the Author

Jason White is a freelance cloud security consultant with 25 years in remote network administration and a lifetime spent writing code in languages including BASICA, Bash,
C, PHP, JavaScript and others. In his spare time, he provides real-time troubleshooting and instruction for a wide variety of modern technologies specializing in designing,
installing, and debugging scalable network applications in the cloud.

A native of the United States, Jason is a well-spoken outdoors enthusiast who can turn difficult technical topics into easy-to-understand analogies in a fun and entertaining
way. Jason also belongs to MENSA and enjoys using his unique gifts to provide solutions, insight, and education to aspiring intellects.

A native of the United States, Jason is a well-spoken outdoors enthusiast that can turn difficult technical topics into easy to understand analogies in a fun and entertaining way.
Jason also belongs to MENSA and enjoys using his unique gifts to provide solutions, insight and education to aspiring intellects.

The Complete Cyber Range Hacking Lab: Full Course

Build a realistic, full featured, Attack and Defense environment on your Home computer. No cloud costs to worry about.

Created by Vonnie Hudson - Ethical Hacker and Teacher

"]

Students: 357, Price: $99.99

Students: 357, Price:  Paid

All *NEW CONTENT* for 2021!

This is the course I wish I had. 

I've been scouring Youtube and Udemy for a complete course that can walk beginners through building a Cyber Range, from start to finish, which includes a Windows Active Directory environment, vulnerable web apps and a full featured SIEM such as the ELK Stack.  There is a terrible shortage of high quality teaching in this subject.  So what did I do?  I marshalled my years of expertise and training to build the best resource for building an ethical hacking cyber attack and defense lab!  I hope to see more training like this on Udemy!

This course is a 100% hands-on workshop.  There are no PowerPoint slides.

By the end of the course you will have the confident feeling and satisfaction of knowing EXACTLY how modern attacks take place on corporate networks. 

We cover everything, nothing is left out.  For example here is a sample of the tools and technologies you will use and learn as you progress through the course:

  1. Zeek (Formerly Bro, Industry standard Network Metadata solution)

  2. Suricata (IDS and Network Security Monitoring)

  3. Stenographer (Google's robust full packet capture solution)

  4. Wireshark (Analyze packets and protocols)

  5. Network Miner (Extract files from packet captures)

  6. Wazuh (Powerful open-source EDR)

  7. Beats (Log shipper for Windows Event logs and more)

  8. OSQuery (Well-known awesome endpoint visibility tool)

  9. Sysmon + Sysmon-Modular (Endpoint visibility on steroids)

  10. Strelka (Automatically detects and analyzes malware and shoots to YARA for analysis)

  11. pfsense (Open-source firewall)

  12. Burp Suite

  13. Nmap

  14. And much much much more...

I am constantly adding to and improving this course it will not get outdated. 

Once you enroll you will be grandfathered into a lifetime of updates.

This course also provides the perfect backdrop to any other ethical hacking courses you take on Udemy because you will have a safe, isolated, realistic environment to hack, detect and block adversary actions.  You will be truly building the ultimate learning resource for ethical hacking!  So what are you doing still reading this?  Jump inside and let's start building your cyber range!

Automation and Hyperautomation

Automation based on example deployment via Jenkins, Ansible, RPA, Terraform and Packer

Created by Łukasz Zawada - Windows SME / DevOps Engineer

"]

Students: 112, Price: $49.99

Students: 112, Price:  Paid

In this course we’re going to talk about many automation aspects. Course is focused on demo and code writing that touch multiple automation silos: Pacer, Terraform, Ansible, Jenkins and RPA. We will try to design, prepare and deploy infrastructure that later going to be configured. Entire process will be orchestrated witch Jenkins that will provide 0-touch provisioning of our platform.

This course is intend to IT audience that already worked as part of Operational team or have relevant knowledge about IT services and architectures. Some basic concepts can be handled also by management of to understand capabilities of products and their purpose.

The pfSense Fundamentals Bootcamp 2021

Secure your Home Network or Business using the pfSense firewall with confidence

Created by Stefan Rosanitsch - pfSense Nerd, Cyber Security Person, Content Creator <3

"]

Students: 30, Price: $29.99

Students: 30, Price:  Paid

Hello and welcome to the course I wish I had when I started with pfSense.

My name is Stefan and I am an officially certified pfSense professional. I had the pleasure of learning what I know directly from Jim Thompson (the CTO and a Core Team Member of Netgate/pfSense).

After finishing this course, you will have everything you need to operate all the basic functions of a pfSense firewall with confidence, and you know how to navigate through your firewall with ease. You can use this knowledge if you want to implement a pfSense firewall in your home network, but you will also be able to integrate and operate a pfSense firewall in a business environment. This is a hands-on course - you are encouraged to follow through with all of the steps as I do them on your own firewall.

Please note that you don't need a physical appliance to follow along with this course. A computer with 8GB of RAM is enough to run a virtual machine with pfSense (covered in the course).

Since integrating pfSense into my own home network many years ago, I immediately fell in love with it. Back then, there were hardly any guides or tutorials for pfSense - so I decided to create my own - which has helped to turn my YouTube channel and my blog into one of the most popular resources for pfSense on the internet.

I have also worked with pfSense professionally in a startup for several years, where I built a complete hybrid-cloud setup using multiple pfSense firewalls - so I have seen both worlds.

  • This is the only Udemy course taught by an officially certified pfSense professional

  • Because of the experience with the community of my blog and my YouTube channel, I know what people struggle with most and I pay extra attention to those topics

  • I leave nothing out - I don't assume you have any prior knowledge

  • Everything is up-to-date - this course was made with pfSense 2.5.2

  • This course will always stay up-to-date. If anything changes, I update the course accordingly

In the end, I also tried to make this course fun. I am not a fan of "dry" content, so I'm throwing a lame dad joke in here and there to loosen things up and keep you motivated.