Protecting Your Network with Open-Source Software
Offered By: LinkedIn Learning
Course Description
Overview
Build a basic and intermediate understanding of network security using easily accessible, free, and open-source software solutions. Hands-on challenges enhance your learning.
Syllabus
Introduction
- Protect your network with free and open-source software
- What you should know
- Environment setup
- What is open-source software?
- Open-source software in networking
- Open-source solutions in cybersecurity
- Open-source vs. commercial software
- Costs and savings
- What is a firewall?
- Host firewalls
- Network firewalls
- Static packet filtering vs. stateful packet inspection
- Challenge: Disable UFW
- Solution: Disable UFW
- Netfilter and iptables
- Setting up a host firewall using iptables
- Automating netfilter configuration
- Understanding hosts as routers
- Adding a network adapter
- Testing the second adapter
- Setting up IP forwarding
- Changing netfilter settings: Part 1
- Changing netfilter settings: Part 2
- Testing the router
- Setting up hosts as network firewalls
- Setting up a web server
- Port forwarding
- Testing port forwarding
- Understanding one-legged DMZ
- Understanding true DMZ
- Understanding an application proxy firewall
- Setting up Squid
- Challenge: Fine-tuning the Squid configuration
- Solution: Fine-tuning the Squid configuration
- What is packet analysis?
- ARP poisoning example
- Packet capturing with Wireshark
- Exploring Wireshark's advanced features
- Wireshark hands-on
- Challenge: Filtering with IP addresses and port numbers
- Solution: Filtering with IP addresses and port numbers
- What is an IDS?
- Introducing Snort
- Snort as a packet sniffer
- Snort as an IDS: Establishing rules
- Snort as an IDS: Detecting pings
- What is a network vulnerability assessment?
- Nessus
- Network scanning with Nessus
- Logging
- syslog-ng
- Log forwarding: Part 1
- Log forwarding: Part 2
- Kiwi
- SNMP
- Next steps
Taught by
Jungwoo Ryoo
Related Courses
Detecting and Mitigating Cyber Threats and AttacksUniversity of Colorado System via Coursera Secure Networked System with Firewall and IDS
University of Colorado System via Coursera Networking in Google Cloud: Fundamentals
Google Cloud via Coursera Introduction to Cybersecurity for Teachers
Raspberry Pi Foundation via FutureLearn Introduction to Cybersecurity Tools & Cyberattacks
IBM via Coursera