Sblqjloatksuuvn6c8wg

The Complete Cyber Security Course! Volume 2 : Network Security

Network Security, WiFi Security, WiFi Hackers, Firewalls, Wireshark. Plus the Best Password Managers

Course Description

Welcome to Volume 2 of 4 of the Complete Cyber Security Course!

This course will help you discover security vulnerabilities across an entire network, by using network hacking techniques and vulnerability scanning .

You will further be able to architect your network for maximum security and prevent local and remote attacks.

The course also covers the use of custom router firmware to provide you with better network security services.

You will understand the various types of firewalls that are available, including layer 4 firewalls like Iptables on Linux and PF on MacOS and BSD, virtual firewalls, host-based firewalls and application based firewalls like Pfsence.

The course covers firewalls on all platforms, including Windows, Mac OS and Linux for all types of use scenarios.

It further explores in detail wireless security, the configurations that are required for maximum security and why, how Wi-Fi is hacked and how to mitigate those attacks - covering everything from encryption weaknesses to evil twins, RF isolation, and Wi-Fi crackers.

You will also learn about network monitoring to discover and identify potential hackers, malware and other adversaries that might be lurking on your network using tools like Wireshark, Tcpdump and Syslog.

The course then moves away from network security and onto the details of how we are tracked online by corporations, nation-states your ISP and others.

You will understand the techniques used like zombie super cookies, browser fingerprinting and how browser profiling works so third parties can establish who you are online.

The course also looks at search engine privacy - and how to mitigate the tracking and privacy issues of search engines and their associated services.

Browser security - It covers one of the largest risks online, the browser. The doorway into your system. How to best reduce the attack surface of the browser and harden it for maximum security and privacy. A critical consideration for reducing your risk.

Finally, you will fully understand how to best use methods of authentication including passwords and multi-factor authentication - soft tokens and hard tokens, the best password managers to use and why, how passwords are cracked, and how to mitigate the cracking.

Interested in Learning Everything About Network Security?

ENROLL IN THE COMPLETE CYBER SECURITY COURSE! VOLUME 2 NOW!

Over 12.5 hours of on-demand video!

What Will I learn?

An advanced practical skill-set in assuring network security against all threats,including advanced hackers, trackers, exploit kits, Wi-Fi attacks and much more.

In this volume, we take a detailed look at network security.

The very latest up-to-date information and methods.

Discover security vulnerabilities across an entire network, by using network hacking techniques and vulnerability scanning.

You will be able to configure firewalls on all platforms, including Windows, MacOS, and Linux for all types of attack scenarios.

Learn to configure and architect a small network for maximum physical and wireless security.

Perform network monitoring to discover and identify potential hackers and malware using tools like Wireshark, Tcpdump, and Syslog.

Understand how we are tracked online by corporations, nation-states your ISP and others.

We look at search engine privacy - we will best understand how to mitigate the tracking and privacy issues of search engines and their associated services.

Understand how to best use methods of authentication including passwords, multi-factor authentication including soft tokens and hard tokens.

What are the best password managers to use and why. How passwords are cracked, and how to mitigate the password attacks.

Requirements

  • This course is designed for personal and home cyber security, privacy and anonymity. Most of the topics apply in the same way to a business, but the course is delivered as if to an individual for personal cyber security, privacy, and anonymity.
  • It is recommended that you watch volume 1 of this complete course before watching this volume (2) although it is not required.
  • You can take this volume as a stand-alone course.
  • You should have a basic understanding of networking concepts.
  • Please note this is volume 2 of 4 of the complete course. After the completion of all 4 volumes, you will know more than 80% of security professionals, government and law enforcement agents and even expert hackers about maintaining security, privacy, and anonymity.


Russell Willis
Another fantastic, practical, useful and timely course from StationX. I very much enjoyed this course and learned a lot of valuable information. I'm confident that my networks will be a lot more secure than before I took this course :)
Thanks again to the course creator for taking time to share such information and to give good, solid and actionable advice.
I would recommend this course to everyone with a home or office network and who may not necessarily have the means afford real life security consultancy.
Very clear accent and audio, the videos are very clear and well presented, excellent!

Brock Lynch

Nathan is extremely knowledgeable and the tone of his voice is very calm throughout the course. The way the content is explained allows the user to easily pick up on what Nathan is saying. I appreciated how thorough the course content has been, and I expect to take the other courses in this series. Unity is a great way to learn.


Includes:
Over 12.5 hours on-demand video
200 plus page Volume 1 eBook
Full lifetime access
Access on mobile and tablet
Certificate of Completion
30-Day Money-Back Guarantee

 

Your Instructor


Nathan House
Nathan House

I have over 24 years experience in cyber security where I have advised some of largest companies in the world, assuring security on multi-million and multi-billion pound projects. I am the CEO of Station X a cyber security consultancy. More recently I acted as the lead security consultant on a number of the UKs mobile banking and payment solutions helping secure to date over £71Bn in transactions.

My clients have included; BP, ExxonMobil, Shell, Vodafone, VISA, T-mobile, GSK, COOP Banking Group, Royal Bank of Scotland, Natwest, Yorkshire bank, BG Group, BT, London 2012.

Over the years I have spoken at a number of security conferences, developed free security tools, and discovered serious security vulnerabilities in leading applications.

Qualifications and education

★ BSc. (Hons) Computing 'Networks & Communication' 1st Class Honors
★ SCF : SABSA Chartered Architect Foundation
★ CISSP : Certified Information Systems Security Professional
★ CISA : Certified Information Systems Auditor
★ CISM : Certified Information Security Manager
★ ISO 27001 Certified ISMS Lead Auditor
★ CEH : Certified Ethical Hacker
★ OSCP : Offensive Security Certified Professional


Class Curriculum


  Section: 2 Goals and Learning Objectives - Volume 2
Available in days
days after you enroll

CERTIFICATE OF COMPLETION

Upon completion of the course, you'll get the opportunity to earn a Certificate of Completion.

Learn More!


Mr. Samuel Schneider
I love the content and message. But be prepared there are many options presented during the course. It's best to identify what strategy you want to use before the course. I really enjoyed this and will certainly look back through my bookmarks for future content reference. Highly recommended.


Aghil Razmara

I need to say the course is amazing, very practical and useful, I personally learnt so much valuable information. I think the course is high level though for people who do not know much about computer networks, basic cuber security principles, web and operating systems, so get familiar with those and then take such courses.

 

Who is the target audience?

This course is for anyone who wants to become an expert in security, privacy, and anonymity. This volume covers network security attacking and defending. Online tracking and browser security.


For anyone who would love to gain a practical skillset in mitigating the risk from malware, Trojans, hackers, trackers, cyber criminals and all online threats.

This course is for anyone who wants to keep their precious files, emails, accounts and personal information out of the hands of the bad guys.

For beginners and intermediate Internet users who are interested in security, safety, and privacy.

For those who want privacy and anonymity online from hackers, corporations and governments.

This course is designed for personal and home Internet security, privacy, and anonymity. Most of the topics apply in the same way to a business, but the course is delivered as if to an individual for personal Internet security, privacy and anonymity.


30-Days Money Back Guarantee!

You are fully protected by our 100% Satisfaction-Guarantee. If you are unsatisfied with the purchase, contact us in first 30 days and we'll send you a prompt refund.

Frequently Asked Questions


When does the course start and finish?
The course starts now and never ends! It is a completely self-paced online course - you decide when you start and when you finish.
How long do I have access to the course?
How does lifetime access sound? After enrolling, you have unlimited access to this course for as long as you like - across any and all devices you own.
What if I am unhappy with the course?
We would never want you to be unhappy! If you are unsatisfied with your purchase, contact us in the first 30 days and we will give you a full refund.

This course is not open for enrollment.