Securing Your Network from Attacks

$6.00

Attacks on enterprise networks and home networks are a growing problem with daily targeted attacks that can result in crippling results. These attacks have become more aggressive, sophisticated, and more dangerous over the years.
This course is designed to give you the knowledge and skills to identify, mitigate, and prevent these attacks and help you secure your network. The course is a practical course and designed to follow along at home or at work.
By the end of this course, you will have a solid understanding of a wide variety of cybersecurity-related areas for home and work.

 

Our Price: $6

Description

Size: 2.24 GB

Table of contents
Chapter 1: Introduction to Network Threats
Course Overview
Yes, You Are a Target
Typical Attacks Against a Network
DOS/DDOS Attacks
Chapter 2: How a Malicious Hacker Goes About Breaking into Your Network
A Malicious Hacker’s Methodology
What We Can Learn from Malicious Hackers
Scanning Tools and Methodology
Social Engineering
Physical Attacks
Getting Sneaky with MiTM and DDOS Attacks
ExploidDB
Chapter 3: Securing Your Network Through Your Users
What is an Insider Threat?
Why Employee Training is Important and Some Tips
Why You Need to Strike a Balance Between Security and Ease of Use
Employee Reporting
Chapter 4: Securing Your Machines
Patching Everything
Antivirus and Console Tools
Fake Error Messages, a Look at Scareware and What it is
Limiting User Rights
Application Reduction, Why You Should Slim It Down
VPN (What it is, Why They are Important)
Chapter 5: Logs and Auditing
System Log Files
Monitoring Software
Snort (IDS)
Network Alert Software and Monitoring (Meraki)
IP (What is IP Addresses, Why They are Important)
Chapter 6: Phishing and Spear Phishing Attacks
About Phishing Emails
Identifying Phishing Emails
Running a Phishing Campaign
Chapter 7: Red Teams and Blue Team Approach
What is a Red Team?
What is a Blue Team?
In-house or Contracted?
Chapter 8: Tracking the Attacker (OSINT)
What is OSINT?
Trace Labs OSINT VM
Tracking by IP
Canary Tokens
Bitcoin Tracking
Chapter 9: Recovering from an Attack
Damage Control and Assessment
Backup and Recovery
Developing and Learning from Your Attack