Welcome to volume 2.
Let's talk about the goals and learning objectives for this volume volume 2 takes a detailed look at network security.
After this course, you will be able to discover network and security vulnerabilities across your entire network.
By using network hacking techniques and vulnerability scanning, you will be able to.
Architect your network for maximum security and prevent local and remote attacks.
We also cover the use of custom firmware.
So you can provide yourself with better network services.
At the end of the course, you will understand the various types of firewalls that are available and what threats each help mitigate, including things like layer 4 firewalls, like IP tables on linux.
PF, on Mac OS X and BSD plus virtual host based and application firewalls are covered.
You will understand in detail wireless security, the configurations that are required for maximum security.
And why on wifi and how wifi is hacked and how to mitigate those attacks, covering everything from encryption weaknesses, to evil twins, radio frequency, isolation, and security testing.
You will master network monitoring to discover and identify potential hackers, malware and other adversaries that might be lurking on your network using tools like Wireshark, TCP dump, SYSlog and others.
We then move away from network security and onto the details of how we are tracked online by corporations, nation states, your ISP and others.
You will understand the technique used like zombie super cookies, browser fingerprinting, and how browser profiling work so third parties can establish who you are in line.
We look at search engine privacy and how to mitigate the tracking and privacy issues that they provide.
We cover one of the largest risks to your online security.
That is the browser, the doorway into your system.
How to best reduce the attack surface of the browser and harden it for maximum security and privacy.
Very important security consideration.
Finally, we fully understand how to best use methods of authentication, including passwords multi-factor authentication, including soft tokens and hardware tokens.
The best password managers to use and why, how passwords are cracked and how to mitigate the cracking through the use of better hashing and key stretching technology and the choice of passwords.
We will also cover the possible future of passwords.
So you know, where things are going.
If you want to know about the continuation of the course through the other volumes, check out the bonus lecture at the end to understand how they all fit together.
This is volume 2 of 4 of your complete guide to cybersecurity, privacy and anonymity.