Network Analysis with pfSense
Offered By: Pluralsight
Course Description
Overview
pfSense provides network firewall, VPN, and other services to users and network operators. It offers IP and port blocking, VPN termination, and DHCP and DNS services. In this course, you'll learn to detect and block adversary activity using pfSense.
Cyber attacks are hitting our networks daily, and some of them have become very advanced. Traditional firewalls can be used in order to help the process of detecting and blocking them. In this course, Network Analysis with pfSense, you’ll cover how to utilize pfSense to protect and detect against common attack and exfiltration techniques in an enterprise environment. First, you’ll demonstrate how to setup a decoy VPN server using pfSense to detect compromised accounts. Next, you’ll operate pfSense to block the use of alternate protocols by blocking unnecessary ports and protocols. Finally, you’ll analyze known anonymity and C2 networks and block them using pfSense’s DNS services. When you’re finished with this course, you’ll have the skills and knowledge to block and detect these techniques External Remove Services T1133, Exfiltration Over Alternative Protocol T1048, and Proxy: Multi-hop Proxy T1090.003 using pfSense.
Cyber attacks are hitting our networks daily, and some of them have become very advanced. Traditional firewalls can be used in order to help the process of detecting and blocking them. In this course, Network Analysis with pfSense, you’ll cover how to utilize pfSense to protect and detect against common attack and exfiltration techniques in an enterprise environment. First, you’ll demonstrate how to setup a decoy VPN server using pfSense to detect compromised accounts. Next, you’ll operate pfSense to block the use of alternate protocols by blocking unnecessary ports and protocols. Finally, you’ll analyze known anonymity and C2 networks and block them using pfSense’s DNS services. When you’re finished with this course, you’ll have the skills and knowledge to block and detect these techniques External Remove Services T1133, Exfiltration Over Alternative Protocol T1048, and Proxy: Multi-hop Proxy T1090.003 using pfSense.
Taught by
Joe Abraham
Related Courses
Teaching Impacts of Technology: Global SocietyUniversity of California, San Diego via Coursera CCNA Security and CCNP Security Deep Dive Part::1
Udemy The Complete Ethical Hacking Course: Beginner to Advanced!
Udemy The Complete Ethical Hacking Course for 2016/2017!
Udemy Clear and Simple VMware NSX 6.2 and vSphere Virtual Networks
Udemy