Video Overview

The Complete Cyber Security Course! Volume 2 Network Security Intro

Hello, and welcome to this complete course on mastering cybersecurity, privacy, and anonymity. 

My name is Nathan House and I'm the CEO and founder of the cybersecurity company stationX and I'm very excited to be here to teach you on another great course. 

I've over 24 years experience in cybersecurity and I've advised many of the largest companies in the world.

The end of this course, you'll have a practical skillset in assuring network security against all threats, including advanced hackers, trackers, exploit kits, wifi attacks, and much more. 

You will go from beginner to expert in easy to follow structured steps. 

And we cover all the major platforms, including Windows, Mac OS X and Linux.

We investigate how physical and wireless networks are compromised by learning the attack techniques used by advanced hackers. 

Then we explore in detail, firewalls, and how to architect your network, the maximum security to prevent those attacks. 

Have you ever wondered if your network has malware or a hacker creeping around on it on this course, you will learn the best and yet simplest methods to monitor your network.

So you can be confident is clean of any network nasties. 

I show you some special tricks using tools like Wireshark, TCP dome, and route. 

All you're concerned about who might be spying on you and tracking you online. 

Learn the techniques that are out there that are used to track you like the zombie super cookies, browser fingerprinting, and how browser profiling establishes who you are and what you are doing.

We also cover how to fully protect you from one of the biggest risk that you have online, that is your own browser, the doorway into your system.

We explore in detail how to reduce the attack surface of your browser and harden it for maximum security and privacy. 

Plus, we learn advanced techniques used by hackers to crack passwords and what can be done to mitigate password attacks.

You will understand password security, multifactor authentication, soft tokens and hard tokens in detail. 

The ideal student for this course is technically minded with an interest in how hackers hack, how trackers track and how we can stop them. 

This is part two of four of your complete guide structured for your optimal learning.

Get answers to every single question that you have

Thank you for your interest. 

If you're ready to learn, then just hit the button to enroll now, or take a test drive by using the free preview feature. 

See you on the course.

Complete and Continue  

Become a Member and Get Unlimited Access to 340+ Top Cyber Security Courses.