Enroll Now | Limited Free Coupons

 

Become a SmartyBro Contributors - 24/7 Live Forums | Submit Your Udemy, Skillshare and Eduonix Free Courses




Have a space adventure. Dive deep into network security, learn how network attacks work and how to prevent them.

"Premium" Udemy Coupon 100% Off 2021 | Latest September Updated,Best Udemy Free Courses 2021,IT & Software,Tech and Progrmming

Network Security: Linux Iptables Firewall vs Attacks.

 

 

What you’ll learn

  • Our main goal is to learn the Iptables Firewall, but in-depth knowledge of the subject requires knowledge of Networks, Network Devices, types of Network Attacks, and problems related to the functioning of the network. This knowledge was also included in the course.
  • About Attacks, how to run them and then use iptables to prevent them [DoS, Fraggle, Ping of Death, Ping Flood, Smurf, Brute Force, Man in the middle, Arp spoofing].
  • Iptables basics [ how to create a rule, iptables commands, tables, matches, chains, targets, iptables data flow diagram].
  • Networks from scratch [based on IPv4, about WAN, LAN, topologies, IP addressing ].
  • Network protocols [ IPv4, ARP, ICMP, TCP, UDP, DNS, DHCP, SSH, Telnet, HTTPS, HTTP ].
  • About Nnap, Wireshark, nping, hping3, IPSET, Putty, arpspoof, net-tools, urlsnarf and more how to use them in practise.
  • About network Scan and how to prevent it using iptables [SYN, ACK, FIN, XMAS, UDP, NULL scans and how to create Custom scan].
  • What is a Firewall and how does it work.
  • How to create a virtual security LAB. Virtualization basics [VirtualBox, what is a host, hypervisor and virtual system, connection types etc.]
  • Creating and configuring a Virtual Laboratory with a Iptables Firewall from scratch.
  • Making Ubuntu Linux act as NAT router and iptables firewall.
  • Security and network problems. How to prevent them in iptables. [Fragmentation, PMTUD, PLMTUD, MTU probing, MSS clamping, Jumbo frames].
  • How to maniputalate with traffic in iptables using custom chains.
  • How to use additional tools like IPSET to work with iptables.
  • What is it and how to create a Whitelist and Blacklist.
  • Network devices and their role [switches L2, L3, routers].
     

Requirements

  • SKILLS: Basic computer usage skills.
  • KNOWLEDGE: NO network, security, Linux commands or firewall knowledge is required
  • SOFTWARE: Firewall iptables, Ubuntu Linux, VirtualBox, network analysis and packet generation tools are NO PAID SOFTWARE. During the course, I also use Windows to install VirtualBox and test the firewall.
  • EXERCISES: You can use a new or existing Ubuntu or Debian Linux distribution to configure your iptables firewall using the sample rules included in the course. The course uses Ubuntu Disco Dingo 19.04.
  • EXERCISES: If you want to create step by step a Virtual Network Laboratory used in the course, your computer should have installed Windows [ XP, 7, 8 or 10 ], 4 or more GB of RAM and optionally a processor that supports virtualization. For more information, see Lecture 15: VirtualBox and Ubuntu Linux – [Requirements and Getting Started].
 
 

Description

Learning doesn’t have to be boring !

And even the most difficult technical issues can be presented in an interesting way.

Let’s move to outer space, and with the heroes of our story, let’s learn the secrets of the Iptables Firewall, learn to configure the VirtualBox virtual environment for network testing purposes, get knowledge about networks and protocols from scratch so that we can properly manage our firewall.

Let’s subject our firewall to a series of network attacksscansanalyzes using the Nmapnpinghping3WiresharkDsniff and other tools. Let’s configure a firewall to prevent them.

Together, we will discover the secrets of the attack on one of the AGRO planets and prevent a catastrophe.

. . .  Our main goal is to learn the Iptables Firewall, but in-depth knowledge of the subject requires knowledge of Networks, Network Devices, types of Network Attacks, and problems related to the functioning of the network. This knowledge was also included in the course.

This course contains a number of solutions that make it easier for you to learn.

Starting with presenting solutions to problems that you meet on your way during system configuration, through problems related to Nmap and Wireshark running on the same machine.

Ending with the presentation of iptables commands.

The commands in this course are additionally presented on the COMMAND BAR in a very large magnification so that you will never miss an error while reading them and copying them to your system.

The course also includes many useful tips on the blue boards that appear throughout the course.

Who this course is for:

  • Anyone who likes to learn IT step by step from scratch.
  • Anyone who is interested in network security, firewalls, network attacks.
  • Anyone who would like to create their own network security analysis laboratory based on virtualization and iptables firewall and learn how to use it.

Have a space adventure. Dive deep into network security, learn how network attacks work and how to prevent them.

Network Security: Linux Iptables Firewall vs Attacks.


, , ,


Subscribe
Notify of
guest
0 Comments
Inline Feedbacks
View all comments