Start learning with our library of video tutorials taught by experts. Get started

Practical Cybersecurity
Illustration by John Hersey

Practical Cybersecurity

with Malcolm Shore

Video: Welcome

Hi, my name is Malcolm Shore, and welcome to Practical Cyber Security.
Expand all | Collapse all
  1. 2m 10s
    1. Welcome
      1m 2s
    2. What you should know before watching this course
      38s
    3. Using the exercise files
      30s
  2. 14m 54s
    1. Hackers and the kill chain
      5m 46s
    2. The Stuxnet kill chain
      3m 38s
    3. Common forms of cybersecurity attack
      5m 30s
  3. 14m 8s
    1. Viruses, spyware, and adware
      1m 37s
    2. Using Windows Defender
      1m 30s
    3. Setting up real-time protection
      37s
    4. Scanning with Windows Defender
      2m 13s
    5. Modifying antivirus settings in Windows Defender
      2m 53s
    6. Scheduling a scan with Windows Defender
      3m 54s
    7. Using Windows Defender offline
      48s
    8. Exploring antivirus on Linux
      36s
  4. 24m 8s
    1. Why firewalls?
      38s
    2. Using the Microsoft Windows Firewall
      5m 15s
    3. Setting up advanced security notifications
      3m 37s
    4. Setting up detailed rules
      3m 18s
    5. Managing and analyzing log files with ZedLan
      3m 25s
    6. Introducing iptables in Linux
      5m 5s
    7. Building a simple firewall with iptables
      2m 50s
  5. 11m 35s
    1. Getting started with Nmap
      1m 7s
    2. Scanning for hosts
      2m 31s
    3. Scanning for services
      2m 2s
    4. Exploring advanced Nmap options
      2m 36s
    5. Scanning in Windows with Zenmap
      3m 19s
  6. 11m 34s
    1. Getting started with Netcat
      2m 8s
    2. Using Netcat for file transfers
      3m 23s
    3. Connecting to services
      2m 35s
    4. Setting up a honeypot with Netcat
      3m 28s
  7. 11m 31s
    1. Introduction to vulnerability scanning
      52s
    2. Getting started with Nessus
      1m 38s
    3. Configuring Nessus
      2m 24s
    4. Running a Nessus scan
      4m 43s
    5. Scheduling a Nessus scan
      1m 54s
  8. 12m 58s
    1. Combating application-level threats
      4m 33s
    2. Web security scanning
      5m 32s
    3. Using the scanner as a web proxy
      2m 53s
  9. 16m 19s
    1. Using Wireshark to explain packet-level activity
      3m 49s
    2. How to capture packets from the network to analyze activity
      2m 11s
    3. Making sense of the TCP/IP protocols
      4m 37s
    4. Filtering packets to focus on areas of interest
      2m 32s
    5. Capturing intruders with packets
      3m 10s
  10. 1m 21s
    1. Summary
      1m 21s

Watch this entire course now —plus get access to every course in the library. Each course includes high-quality videos taught by expert instructors.

Become a member
please wait ...
Practical Cybersecurity
2h 0m Beginner Aug 26, 2014

Viewers: in countries Watching now:

Protect your network from cyber attacks. Malcolm Shore shows how to use the latest tools to discourage and combat hackers, phishers, and snoops attempting to infiltrate your Windows and Linux systems. Learn what forms cyber attacks can take, and the two most common types of protection you can build into your system: antivirus protection and firewalls. Then learn how to scan your network for suspicious files, detect intruders with Netcat, and identify vulnerabilities at the host level with Nessus scans. Malcolm also shows how to avoid common security mistakes and monitor packet-level activity on your network.

Topics include:
  • Hackers and the kill chain
  • Viruses, spyware, and adware
  • Scanning with Windows Defender
  • Building firewalls
  • Scanning with Nmap
  • Monitoring network communications with Netcat
  • Combating application-level threats
  • Capturing intruders through packet inspection
Subjects:
IT IT and Hardware
Software:
N-Stalker Nessus Nmap Netcat
Author:
Malcolm Shore

Welcome

Hi, my name is Malcolm Shore, and welcome to Practical Cyber Security. This course is about the common tools used to identify vulnerabilities in networks and systems which might be exploited in a cyber attack. I'll start by taking a look at the two most common security tools, Antivirus, and Firewalls. Then I'll look at how hackers profile a network to check where systems are connected, what services are open, and what software is running.

I'll use two popular tools, Nmap and Netcat. I'll then demonstrate the Nessus and Vega scanners to check open services for vulnerabilities. Finally, I'll use Wireshark Packet Capture Tool, to monitor and analyze the raw packets being sent across the network. When you finish this course, you'll have a great understanding of how to profile and protect your network, how to check whether it could be compromised, and how to monitor the activity on it. So let's get started with Practical Cybersecurity.

There are currently no FAQs about Practical Cybersecurity.

 
Share a link to this course

What are exercise files?

Exercise files are the same files the author uses in the course. Save time by downloading the author's files instead of setting up your own files, and learn by following along with the instructor.

Can I take this course without the exercise files?

Yes! If you decide you would like the exercise files later, you can upgrade to a premium account any time.

Become a member Download sample files See plans and pricing

Please wait... please wait ...
Upgrade to get access to exercise files.

Exercise files video

How to use exercise files.

Learn by watching, listening, and doing, Exercise files are the same files the author uses in the course, so you can download them and follow along Premium memberships include access to all exercise files in the library.


Exercise files

Exercise files video

How to use exercise files.

For additional information on downloading and using exercise files, watch our instructional video or read the instructions in the FAQ .

This course includes free exercise files, so you can practice while you watch the course. To access all the exercise files in our library, become a Premium Member.

Join now Already a member? Log in

Are you sure you want to mark all the videos in this course as unwatched?

This will not affect your course history, your reports, or your certificates of completion for this course.


Mark all as unwatched Cancel

Congratulations

You have completed Practical Cybersecurity.

Return to your organization's learning portal to continue training, or close this page.


OK
Become a member to add this course to a playlist

Join today and get unlimited access to the entire library of video courses—and create as many playlists as you like.

Get started

Already a member ?

Become a member to like this course.

Join today and get unlimited access to the entire library of video courses.

Get started

Already a member?

Exercise files

Learn by watching, listening, and doing! Exercise files are the same files the author uses in the course, so you can download them and follow along. Exercise files are available with all Premium memberships. Learn more

Get started

Already a Premium member?

Exercise files video

How to use exercise files.

Ask a question

Thanks for contacting us.
You’ll hear from our Customer Service team within 24 hours.

Please enter the text shown below:

The classic layout automatically defaults to the latest Flash Player.

To choose a different player, hold the cursor over your name at the top right of any lynda.com page and choose Site preferences from the dropdown menu.

Continue to classic layout Stay on new layout
Exercise files

Access exercise files from a button right under the course name.

Mark videos as unwatched

Remove icons showing you already watched videos if you want to start over.

Control your viewing experience

Make the video wide, narrow, full-screen, or pop the player out of the page into its own window.

Interactive transcripts

Click on text in the transcript to jump to that spot in the video. As the video plays, the relevant spot in the transcript will be highlighted.

Are you sure you want to delete this note?

No

Your file was successfully uploaded.

Thanks for signing up.

We’ll send you a confirmation email shortly.


Sign up and receive emails about lynda.com and our online training library:

Here’s our privacy policy with more details about how we handle your information.

Keep up with news, tips, and latest courses with emails from lynda.com.

Sign up and receive emails about lynda.com and our online training library:

Here’s our privacy policy with more details about how we handle your information.

   
submit Lightbox submit clicked
Terms and conditions of use

We've updated our terms and conditions (now called terms of service).Go
Review and accept our updated terms of service.