Start your free trial now, and begin learning software, business and creative skills—anytime, anywhere—with video instruction from recognized industry experts.

Start Your Free Trial Now

Practical Cybersecurity

with Malcolm Shore

Video: Welcome

Protect your networks from cyber attacks. Learn how to implement antivirus protection and firewalls and scan for suspicious activity.
Expand all | Collapse all
  1. 2m 10s
    1. Welcome
      1m 2s
    2. What you should know before watching this course
    3. Using the exercise files
  2. 14m 54s
    1. Hackers and the kill chain
      5m 46s
    2. The Stuxnet kill chain
      3m 38s
    3. Common forms of cybersecurity attack
      5m 30s
  3. 14m 8s
    1. Viruses, spyware, and adware
      1m 37s
    2. Using Windows Defender
      1m 30s
    3. Setting up real-time protection
    4. Scanning with Windows Defender
      2m 13s
    5. Modifying antivirus settings in Windows Defender
      2m 53s
    6. Scheduling a scan with Windows Defender
      3m 54s
    7. Using Windows Defender offline
    8. Exploring antivirus on Linux
  4. 24m 8s
    1. Why firewalls?
    2. Using the Microsoft Windows Firewall
      5m 15s
    3. Setting up advanced security notifications
      3m 37s
    4. Setting up detailed rules
      3m 18s
    5. Managing and analyzing log files with ZedLan
      3m 25s
    6. Introducing iptables in Linux
      5m 5s
    7. Building a simple firewall with iptables
      2m 50s
  5. 11m 35s
    1. Getting started with Nmap
      1m 7s
    2. Scanning for hosts
      2m 31s
    3. Scanning for services
      2m 2s
    4. Exploring advanced Nmap options
      2m 36s
    5. Scanning in Windows with Zenmap
      3m 19s
  6. 11m 34s
    1. Getting started with Netcat
      2m 8s
    2. Using Netcat for file transfers
      3m 23s
    3. Connecting to services
      2m 35s
    4. Setting up a honeypot with Netcat
      3m 28s
  7. 11m 31s
    1. Introduction to vulnerability scanning
    2. Getting started with Nessus
      1m 38s
    3. Configuring Nessus
      2m 24s
    4. Running a Nessus scan
      4m 43s
    5. Scheduling a Nessus scan
      1m 54s
  8. 12m 58s
    1. Combating application-level threats
      4m 33s
    2. Web security scanning
      5m 32s
    3. Using the scanner as a web proxy
      2m 53s
  9. 16m 19s
    1. Using Wireshark to explain packet-level activity
      3m 49s
    2. How to capture packets from the network to analyze activity
      2m 11s
    3. Making sense of the TCP/IP protocols
      4m 37s
    4. Filtering packets to focus on areas of interest
      2m 32s
    5. Capturing intruders with packets
      3m 10s
  10. 1m 21s
    1. Summary
      1m 21s

please wait ...
Practical Cybersecurity
Video Duration: 0s 2h 0m Beginner


View Course Description

Protect your network from cyber attacks. Malcolm Shore shows how to use the latest tools to discourage and combat hackers, phishers, and snoops attempting to infiltrate your Windows and Linux systems. Learn what forms cyber attacks can take, and the two most common types of protection you can build into your system: antivirus protection and firewalls. Then learn how to scan your network for suspicious files, detect intruders with Netcat, and identify vulnerabilities at the host level with Nessus scans. Malcolm also shows how to avoid common security mistakes and monitor packet-level activity on your network.

Topics include:
  • Hackers and the kill chain
  • Viruses, spyware, and adware
  • Scanning with Windows Defender
  • Building firewalls
  • Scanning with Nmap
  • Monitoring network communications with Netcat
  • Combating application-level threats
  • Capturing intruders through packet inspection
N-Stalker Nessus Nmap Netcat


Hi, my name is Malcolm Shore, and welcome to Practical Cyber Security. This course is about the common tools used to identify vulnerabilities in networks and systems which might be exploited in a cyber attack. I'll start by taking a look at the two most common security tools, Antivirus, and Firewalls. Then I'll look at how hackers profile a network to check where systems are connected, what services are open, and what software is running.

I'll use two popular tools, Nmap and Netcat. I'll then demonstrate the Nessus and Vega scanners to check open services for vulnerabilities. Finally, I'll use Wireshark Packet Capture Tool, to monitor and analyze the raw packets being sent across the network. When you finish this course, you'll have a great understanding of how to profile and protect your network, how to check whether it could be compromised, and how to monitor the activity on it. So let's get started with Practical Cybersecurity.

There are currently no FAQs about Practical Cybersecurity.






Don't show this message again
Share a link to this course

What are exercise files?

Exercise files are the same files the author uses in the course. Save time by downloading the author's files instead of setting up your own files, and learn by following along with the instructor.

Can I take this course without the exercise files?

Yes! If you decide you would like the exercise files later, you can upgrade to a premium account any time.

Become a member Download sample files See plans and pricing

Please wait... please wait ...
Upgrade to get access to exercise files.

Exercise files video

How to use exercise files.

Learn by watching, listening, and doing, Exercise files are the same files the author uses in the course, so you can download them and follow along Premium memberships include access to all exercise files in the library.

Exercise files

Exercise files video

How to use exercise files.

For additional information on downloading and using exercise files, watch our instructional video or read the instructions in the FAQ .

This course includes free exercise files, so you can practice while you watch the course. To access all the exercise files in our library, become a Premium Member.

Join now Already a member? Log in

* Estimated file size

Are you sure you want to mark all the videos in this course as unwatched?

This will not affect your course history, your reports, or your certificates of completion for this course.

Mark all as unwatched Cancel


You have completed Practical Cybersecurity.

Return to your organization's learning portal to continue training, or close this page.


Upgrade to View Courses Offline


With our new Desktop App, Annual Premium Members can download courses for Internet-free viewing.

Upgrade Now

After upgrading, download Desktop App Here.

Become a Member and Create Custom Playlists

Join today and get unlimited access to the entire library of online learning video courses—and create as many playlists as you like.

Get started

Already a member?

Log in

Exercise files

Learn by watching, listening, and doing! Exercise files are the same files the author uses in the course, so you can download them and follow along. Exercise files are available with all Premium memberships. Learn more

Get started

Already a Premium member?

Exercise files video

How to use exercise files.

Ask a question

Thanks for contacting us.
You’ll hear from our Customer Service team within 24 hours.

Please enter the text shown below:

Exercise files

Access exercise files from a button right under the course name.

Mark videos as unwatched

Remove icons showing you already watched videos if you want to start over.

Control your viewing experience

Make the video wide, narrow, full-screen, or pop the player out of the page into its own window.

Interactive transcripts

Click on text in the transcript to jump to that spot in the video. As the video plays, the relevant spot in the transcript will be highlighted.

You started this assessment previously and didn’t complete it.

You can pick up where you left off, or start over.

Resume Start over

Learn more, save more. Upgrade today!

Get our Annual Premium Membership at our best savings yet.

Upgrade to our Annual Premium Membership today and get even more value from your subscription:

“In a way, I feel like you are rooting for me. Like you are really invested in my experience, and want me to get as much out of these courses as possible this is the best place to start on your journey to learning new material.”— Nadine H.

Thanks for signing up.

We’ll send you a confirmation email shortly.

Sign up and receive emails about and our online training library:

Here’s our privacy policy with more details about how we handle your information.

Keep up with news, tips, and latest courses with emails from

Sign up and receive emails about and our online training library:

Here’s our privacy policy with more details about how we handle your information.

submit Lightbox submit clicked
Terms and conditions of use

We've updated our terms and conditions (now called terms of service).Go
Review and accept our updated terms of service.