- View Offline
- Hackers and the kill chain
- Viruses, spyware, and adware
- Scanning with Windows Defender
- Building firewalls
- Scanning with Nmap
- Monitoring network communications with Netcat
- Combating application-level threats
- Capturing intruders through packet inspection
Skill Level Beginner
(tinkling music) - [Voiceover] Hi, my name is Malcolm Shore, and welcome to Practical Cybersecurity. This course is about the common tools used to identity vulnerabilities in networks and systems which might be exploited in a cyber attack. I'll start by taking a look at the two most common security tools, antivirus and firewalls. Then I'll look at how hackers profile a network to check what systems are connected, what services are open, and what software is running.
I use two popular tools, Nmap and Netcam. I'll then demonstrate the Nessus and V-gus scanners to check open services for vulnerabilities. Finally, I'll use Wireshark packet capture tool to monitor and analyze the raw packets being sent across the network. When you finish this course, you'll have a great understanding or how to profile and protect your network, how to check whether it could be compromised, and how to monitor the activity on it. So let's get started with Practical Cybersecurity.