Protect your networks from cyberattacks. Learn how to implement antivirus protection and firewalls and scan for suspicious activity.
Overview
Syllabus
Introduction
- Learn the basics and common tools of cybersecurity
- What you should know
- Disclaimer
- A history of hackers
- The cyber kill chain
- Stuxnet and the kill chain
- Common forms of cyber attack
- Viruses, spyware, and adware
- Introducing Microsoft Windows Defender
- Detecting malware with Defender
- Defender advanced settings
- Automating scans with task scheduler
- Other antivirus solutions
- Why firewalls?
- Windows firewall basics
- Advanced Windows firewall
- ZedLan firewall log analyzer
- Introducing Linux iptables
- Setting up a simple iptables firewall
- Getting started with Nmap
- Advanced Nmap options
- GUI scanning with Zenmap
- Getting started with netcat
- Transferring files using netcat
- Connecting to services
- Setting up a netcat honeypot
- Preparing Nessus to do scanning
- Setting up a Nessus policy
- Running a Nessus scan
- Scheduling scans
- Combating application level threats
- Running an SQL injection attack
- Cross-site scripting
- Installing a web scanner
- Scanning a website
- Using a web proxy to inspect traffic
- Explaining networks
- Capturing packets with Wireshark
- Making sense of the protocols
- Using Wireshark filters
- Capturing intruders with packets
- Next steps
Taught by
Malcolm Shore