Firewalls are essential when connecting to today's internet. In this video, learn why firewalls are necessary and the risks of having your systems connected to the internet without a firewall.
- [Man] Cybersecurity is a popular, regular, and somewhat sensationalized topic in the media. Most reports and advice focuses on the risk of malware being delivered through web browser and email. While these are important vectors for infection, we shouldn't forget that attackers will use the easiest and most reliable way of penetrating our systems, direct access into unprotected systems and networks. We need to protect those networks and we can do this using what's known as a firewall. For home and mobile users, the default configuration for home routers will generally include blocking all access with it's built-in firewall. Network management should be carried out from inside the network, not remotely. If remote access is not blocked, direct penetration into the home network through hacking will be a significant issue. However, even with router best protection, it's also worth activating individual computer personal firewalls. For businesses, the enterprise firewall is the basic protection against direct access from the internet. This is usually a dedicated device using a proprietary operating system. All systems should be behind an enterprise firewall and a second internal firewall should be in place to protect the internal systems. The domain in between the two firewalls is often called a demilitarized zone or DMZ and it's here that internet facing services can be placed. Enterprise firewalls may include very sophisticated configuration options around different protocols and subnets. We won't cover dedicated firewalls in this course but the basic principles are the same. A firewall is designed to mediate access between computers. To do this, it has a set of rules which instructs it to either allow or deny a connection to services. It will also typically translate an external internet address into an internal network address. This process is called network address translation or NAT. In this course, we'll focus on the Windows personal file and on the use of the IP table's firewall in Linux which is often used in enterprise systems.
- Hackers and the kill chain
- Viruses, spyware, and adware
- Detecting malware with Windows Defender
- Using Windows Firewall and Linux iptables
- Scanning with Nmap
- Monitoring network communications with Netcat
- Combating application-level threats
- Scanning a website to check for vulnerabilities
- Capturing intruders through packet inspection