Securing Your Network from Attacks

Video description

Attacks on enterprise networks and home networks are a growing problem with daily targeted attacks that can result in crippling results. These attacks have become more aggressive, sophisticated, and more dangerous over the years.
This course is designed to give you the knowledge and skills to identify, mitigate, and prevent these attacks and help you secure your network. The course is a practical course and designed to follow along at home or at work.
By the end of this course, you will have a solid understanding of a wide variety of cybersecurity-related areas for home and work.

Table of contents

  1. Chapter 1: Introduction to Network Threats
    1. Course Overview
    2. Yes, You Are a Target
    3. Typical Attacks Against a Network
    4. DOS/DDOS Attacks
  2. Chapter 2: How a Malicious Hacker Goes About Breaking into Your Network
    1. A Malicious Hacker’s Methodology
    2. What We Can Learn from Malicious Hackers
    3. Scanning Tools and Methodology
    4. Social Engineering
    5. Physical Attacks
    6. Getting Sneaky with MiTM and DDOS Attacks
    7. ExploidDB
  3. Chapter 3: Securing Your Network Through Your Users
    1. What is an Insider Threat?
    2. Why Employee Training is Important and Some Tips
    3. Why You Need to Strike a Balance Between Security and Ease of Use
    4. Employee Reporting
  4. Chapter 4: Securing Your Machines
    1. Patching Everything
    2. Antivirus and Console Tools
    3. Fake Error Messages, a Look at Scareware and What it is
    4. Limiting User Rights
    5. Application Reduction, Why You Should Slim It Down
    6. VPN (What it is, Why They are Important)
  5. Chapter 5: Logs and Auditing
    1. System Log Files
    2. Monitoring Software
    3. Snort (IDS)
    4. Network Alert Software and Monitoring (Meraki)
    5. IP (What is IP Addresses, Why They are Important)
  6. Chapter 6: Phishing and Spear Phishing Attacks
    1. About Phishing Emails
    2. Identifying Phishing Emails
    3. Running a Phishing Campaign
  7. Chapter 7: Red Teams and Blue Team Approach
    1. What is a Red Team?
    2. What is a Blue Team?
    3. In-house or Contracted?
  8. Chapter 8: Tracking the Attacker (OSINT)
    1. What is OSINT?
    2. Trace Labs OSINT VM
    3. Tracking by IP
    4. Canary Tokens
    5. Bitcoin Tracking
  9. Chapter 9: Recovering from an Attack
    1. Damage Control and Assessment
    2. Backup and Recovery
    3. Developing and Learning from Your Attack

Product information

  • Title: Securing Your Network from Attacks
  • Author(s): Jeff Minakata
  • Release date: September 2020
  • Publisher(s): EC-Council
  • ISBN: None