Join Malcolm Shore for an in-depth discussion in this video What you should know, part of Cybersecurity for IT Professionals.
- [Malcolm] This is a practical course which introduces a number of tools which are used to analyze and protect systems. In explaining how the tools work, I'll be assuming that you understand basic computer networking concepts. And I'll be using common networking terminology. The course doesn't require you to have any prior knowledge of cyber security. This is a practical course and requires multiple computers to show cyber attack and defense techniques. I'd recommend that you practice along with the course so you'll need to have a test network. In this course, I'll use my Windows 10 based virtual box test network. This has a Windows 7 workstation on IP address 10.0.2.6 and with Hydra an IP address 10.0.2.12 and Scorpio on IP address 10.0.2.31. One option for setting up the Linux host is to use two small computers such as a Raspberry Pi. Setting up the Raspberry Pi involves connecting a keyboard, a mouse, and a screen and then configuring its network settings. If you're not familiar with the Raspberry Pi, there are courses in our library to help you set one up. Alternatively, you can set up a test network with Linux virtual machines. If you're planning to progress with your ethical hacking training, this will be the best option as you'll be needing a test lab anyway. If you're not familiar with VirtualBox, you can learn how to set up a lab by following the videos in my Kali Linux course where I cover the essentials of setting up a VirtualBox virtual machine test lab with Windows and Linux hosts. If you prefer VMare, then you can use that also. If you're not familiar with setting up VMware work station, then again we have courses in the library on setting up and running a VMware network. I've included with the course a file that provides details of how to install the tools that I use in this course. You'll see the terminal commands I use on the video and I've also included them in the attached file for easy reference.
- Hackers and the kill chain
- Viruses, spyware, and adware
- Detecting malware with Windows Defender
- Using Windows Firewall and Linux iptables
- Scanning with Nmap
- Monitoring network communications with Netcat
- Combating application-level threats
- Scanning a website to check for vulnerabilities
- Capturing intruders through packet inspection