وب سایت تخصصی شرکت فرین
دسته بندی دوره ها

Protecting Your Network with Open-Source Software

سرفصل های دوره

Network protection is vital to organizations big and small, but it doesn't have to be an expensive proposition. In this course, Jungwoo Ryoo—a professor who teaches IT, cyber security, and risk analysis at Penn State—shows you how to protect your network with open-source tools that are completely free. Find out how to set up firewalls, investigate network traffic with a packet analyzer, detect threats and malicious activities with an intrusion-detection system, and enable network logging and monitoring. Learn about new trends in network protection and dive into demonstrations, case studies, and hands-on challenges. This course enables you to explore a low-cost route to a more secure network.


01 - Introduction
  • 01 - Protect your network with free and open-source software
  • 02 - What you should know
  • 03 - Environment setup

  • 02 - 1. Understanding Open-Source Software
  • 01 - What is open-source software
  • 02 - Open-source software in networking
  • 03 - Open-source solutions in cybersecurity
  • 04 - Open-source vs. commercial software
  • 05 - Costs and savings

  • 03 - 2. Firewalls
  • 01 - What is a firewall
  • 02 - Host firewalls
  • 03 - Network firewalls
  • 04 - Static packet filtering vs. stateful packet inspection
  • 05 - Challenge Disable UFW
  • 06 - Solution Disable UFW

  • 04 - 3. Host as a Router
  • 01 - Netfilter and iptables
  • 02 - Setting up a host firewall using iptables
  • 03 - Automating netfilter configuration
  • 04 - Understanding hosts as routers
  • 05 - Adding a network adapter
  • 06 - Testing the second adapter
  • 07 - Setting up IP forwarding
  • 08 - Changing netfilter settings Part 1
  • 09 - Changing netfilter settings Part 2
  • 10 - Testing the router

  • 05 - 4. Host as a Network Firewall
  • 01 - Setting up hosts as network firewalls
  • 02 - Setting up a web server
  • 03 - Port forwarding
  • 04 - Testing port forwarding
  • 05 - Understanding one-legged DMZ
  • 06 - Understanding true DMZ
  • 07 - Understanding an application proxy firewall
  • 08 - Setting up Squid
  • 09 - Challenge Fine-tuning the Squid configuration
  • 10 - Solution Fine-tuning the Squid configuration

  • 06 - 5. Packet Analysis
  • 01 - What is packet analysis
  • 02 - ARP poisoning example
  • 03 - Packet capturing with Wireshark
  • 04 - Exploring Wiresharks advanced features
  • 05 - Wireshark hands-on
  • 06 - Challenge Filtering with IP addresses and port numbers
  • 07 - Solution Filtering with IP addresses and port numbers

  • 07 - 6. IDSs and Vulnerability Assessment
  • 01 - What is an IDS
  • 02 - Introducing Snort
  • 03 - Snort as a packet sniffer
  • 04 - Snort as an IDS Establishing rules
  • 05 - Snort as an IDS Detecting pings
  • 06 - What is a network vulnerability assessment
  • 07 - Nessus
  • 08 - Network scanning with Nessus

  • 08 - 7. Logging and Monitoring
  • 01 - Logging
  • 02 - syslog-ng
  • 03 - Log forwarding Part 1
  • 04 - Log forwarding Part 2
  • 05 - Kiwi
  • 06 - SNMP

  • 09 - Conclusion
  • 01 - Next steps
  • 139,000 تومان
    بیش از یک محصول به صورت دانلودی میخواهید؟ محصول را به سبد خرید اضافه کنید.
    خرید دانلودی فوری

    در این روش نیاز به افزودن محصول به سبد خرید و تکمیل اطلاعات نیست و شما پس از وارد کردن ایمیل خود و طی کردن مراحل پرداخت لینک های دریافت محصولات را در ایمیل خود دریافت خواهید کرد.

    ایمیل شما:
    تولید کننده:
    مدرس:
    شناسه: 42162
    حجم: 351 مگابایت
    مدت زمان: 167 دقیقه
    تاریخ انتشار: ۷ دی ۱۴۰۳
    طراحی سایت و خدمات سئو

    139,000 تومان
    افزودن به سبد خرید