Sorry, your browser is not supported
To have the best experience using Skillshare, we recommend that you use one of these supported browsers.

The Complete Cyber Security Course! Volume 2 : Network Security!

Nathan House

Play Speed
  • 0.5x
  • 1x (Normal)
  • 1.25x
  • 1.5x
  • 2x
106 Videos (12h 24m)
    • Welcome to Volume 2

      0:34
    • Introduction to the Instructor!

      2:06
    • Security Quick Win!

      11:23
    • Target Audience

      1:54
    • Study Recommendations

      5:16
    • The Forum - For Questions, Answers and Other Resources

      1:34
    • Course updates

      0:40
    • Goals and Learning Objectives - Volume 2

      3:09
    • Goals and Learning Objectives - Routers - Port and Vulnerability Scanning

      0:28
    • The Home Router

      13:44
    • External Vulnerability Scanning - Shodan, Qualys & Nmap

      16:23
    • Internal Vulnerability Scanning - MBSA, Nmap, Nessus, Fing & Superscan & OpenVAS

      19:33
    • Open Source Custom Router Firmware

      11:37
    • Goals and Learning Objectives - Firewalls

      0:25
    • Firewalls – Host-based, Network-based and Virtual Part 1

      14:48
    • Firewalls – Host-based, Network-based and Virtual Part 2

      4:54
    • Windows - Host Based Firewalls - Windows Firewall

      10:29
    • Windows - Host Based Firewalls - Windows Firewall Control (WFC)

      5:18
    • Windows - Host Based Firewalls - Third Party

      8:45
    • Linux - Host Based Firewalls - iptables

      19:58
    • Linux - Host Based Firewalls - UFW, gufw & nftables

      12:07
    • Mac OS X - Host based Firewalls - Application Firewall & PF

      13:52
    • Mac OS X - Host based Firewalls - pflist, Icefloor & Murus

      7:47
    • Mac OS X - Host based Firewalls - Little Snitch

      6:22
    • Network based firewalls - Routers - DD-WRT

      5:09
    • Network based firewalls - Hardware

      2:43
    • Network based firewalls - PFsence, Smoothwall and Vyos

      10:34
    • Goals and Learning Objectives - Network Attacks, Architecture and Isolation

      0:17
    • Network Attacks and Network Isolation - Introduction and IOT

      6:34
    • Network Attacks and Network Isolation - Arp Spoofing and Switches

      6:19
    • Effective Network Isolation Part 1

      12:27
    • Effective Network Isolation Part 2

      7:26
    • Goals and Learning Objectives - Wireless and Wi-Fi Security

      0:25
    • Wi-Fi Weaknesses - WEP

      2:28
    • Wi-Fi Weaknesses - WPA, WPA2, TKIP and CCMP

      13:40
    • Wi-Fi Weaknesses - Wi-Fi Protected Setup WPS, Evil Twin and Rouge AP

      6:49
    • Wi-Fi Security Testing

      4:01
    • Wireless Security - Secure Configuration and Network Isolation

      14:18
    • Wireless Security - RF Isolation and Reduction

      3:01
    • Wireless Security - Who is on my Wi-Fi Network?

      3:20
    • Goals and Learning Objectives - Network Monitoring for Threats

      0:17
    • Syslog

      16:59
    • Network Monitoring - Wireshark, tcpdump, tshark, iptables Part 1

      14:01
    • Network Monitoring - Wireshark, tcpdump, tshark, iptables Part 2

      7:59
    • Wireshark - Finding malware and hackers - Part 1

      15:46
    • Wireshark - Finding malware and hackers - Part 2

      8:12
    • Network Monitoring - Wincap, NST, Netminer and NetWorx

      1:38
    • Goals and Learning Objectives - How We Are Tracked Online

      0:23
    • Types of Tracking

      4:25
    • IP Address

      5:27
    • 3rd Party Connections

      4:25
    • HTTP Referer

      3:21
    • Cookies and Scripts

      7:59
    • Super Cookies

      5:12
    • Browser Fingerprinting and Browser Volunteered Information

      2:36
    • Browser and Browser Functionality

      1:39
    • More Tracking

      2:48
    • Browser and Internet Profiling

      6:35
    • Goals and Learning Objectives - Search Engines and Privacy

      0:19
    • Search Engine Tracking, Censorship and Privacy

      12:44
    • Ixquick and Startpage

      7:56
    • DuckDuckGo

      3:44
    • Disconnect search

      4:43
    • YaCy

      3:32
    • Private and Anonymous Searching

      7:34
    • Goals and Learning Objectives - Browser Security and Tracking Prevention

      0:21
    • Which Browser – Choice of Browser

      6:01
    • Reducing the Browser Attack Surface

      11:34
    • Browser Hacking Demo

      9:26
    • Browser Isolation and Compartmentalization

      6:10
    • Firefox Security, Privacy and Tracking

      12:26
    • uBlock origin - HTTP Filters, ad and track blockers

      14:13
    • uMatrix - HTTP Filters, ad and track blockers

      7:14
    • Disconnect, Ghostery, Request policy - HTTP Filters, ad and track blockers

      6:37
    • ABP, Privacy badger, WOT - HTTP Filters, ad and track blockers

      6:46
    • No-script - HTTP Filters, ad and track blockers

      8:29
    • Policeman and others - HTTP Filters, ad and track blockers

      3:56
    • History, Cookies and Super Cookies Part 1

      11:43
    • History, Cookies and Super Cookies Part 2

      12:13
    • HTTP Referer

      2:19
    • Browser Fingerprinting

      18:26
    • Certificates and Encryption

      11:29
    • Firefox Hardening

      18:49
    • Goals and Learning Objectives - Passwords and Authentication Methods

      0:31
    • Password attacks

      3:22
    • How Passwords are Cracked - Hashes - Part 1

      16:17
    • How Passwords are Cracked - Hashes - Part 2

      7:09
    • Operating System Passwords

      2:27
    • Password Managers - An Introduction

      2:07
    • Password Managers - Master Password

      5:12
    • Password Managers - Keepass and KeePassX

      4:59
    • Password Managers - Lastpass

      11:22
    • Password Managers - Hardening Lastpass

      7:34
    • Creating a Strong Password That You Can Remember - Part 1

      8:53
    • Creating a Strong Password That You Can Remember - Part 2

      9:23
    • Multi-Factor Authentication - Soft Tokens - Google Authenticator and Authy

      10:54
    • Multi-Factor Authentication - Hard Tokens - 2FA Dongles

      5:53
    • Choosing a Method of Multi-Factor Authentication

      2:50
    • Multi-Factor Authentication - Strengths and Weaknesses

      2:09
    • The Future of Password and Authentication

      1:22
    • BONUS - Important Information

      0:46
    • BONUS - Congratulations

      1:41
    • BONUS - Certificate of Completion for CPEs

      0:56
    • BONUS Lecture from Volume 3 - Which VPN protocol is best to use? and why?

      11:43
    • BONUS Lecture from Volume 4 - Email Tracking and Hacking

      10:33
    • BONUS Lecture from Volume 1 - Security Vulnerabilities, Threats and Adversaries

      4:37