Network Security: Linux Iptables Firewall vs Attacks.

Have a space adventure. Dive deep into network security, learn how network attacks work and how to prevent them.

Ratings 3.54 / 5.00
Network Security: Linux Iptables Firewall vs Attacks.

What You Will Learn!

  • Our main goal is to learn the Iptables Firewall, but because in-depth knowledge of this subject requires knowledge of Networks, Network Devices, types of Networ
  • About Attacks, how to run them and next prevent [DoS, Fraggle, Ping of Death, Ping Flood, Smurf, Brute Force, Man in the middle, Arp spoofing].
  • Iptables basics [ how to create a rule, iptables commands, tables, matches, chains, targets, iptables data flow diagram].
  • Networks from scratch [based on IPv4, about WAN, LAN, topologies, IP addressing ].
  • Network protocols [ IPv4, ARP, ICMP, TCP, UDP, DNS, DHCP, SSH, Telnet, HTTPS, HTTP ].
  • About Nnap, Wireshark, nping, hping3, IPSET, Putty, arpspoof, net-tools, urlsnarf and more how to use them in practise.
  • About network Scan and how to prevent it using iptables [SYN, ACK, FIN, XMAS, UDP, NULL scans and how to create Custom scan].
  • What is a Firewall and how does it work.
  • How to create a virtual security LAB. Virtualization basics [VirtualBox, what is a host, hypervisor and virtual system, connection types etc.]
  • Creating and configuring a Virtual Laboratory with a Iptables Firewall from scratch.
  • Making Ubuntu Linux act as NAT router and iptables firewall.
  • Security and network problems. How to prevent them in iptables. [Fragmentation, PMTUD, PLMTUD, MTU probing, MSS clamping, Jumbo frames].
  • How to maniputalate with traffic in iptables using custom chains.
  • How to use additional tools like IPSET to work with iptables.
  • What is it and how to create a Whitelist and Blacklist.
  • Network devices and their role [switches L2, L3, routers].

Description

Learning doesn't have to be boring !

And even the most difficult technical issues can be presented in an interesting way.

Let's move to outer space, and with the heroes of our story, let's learn the secrets of the Iptables Firewall, learn to configure the VirtualBox virtual environment for network testing purposes, get knowledge about networks and protocols from scratch so that we can properly manage our firewall.

Let's subject our firewall to a series of network attacks, scans, analyzes using the Nmap, nping, hping3, Wireshark, Dsniff and other tools. Let's configure a firewall to prevent them.


Together, we will discover the secrets of the attack on one of the AGRO planets and prevent a catastrophe.


. . .  Our main goal is to learn the Iptables Firewall, but in-depth knowledge of the subject requires knowledge of Networks, Network Devices, types of Network Attacks, and problems related to the functioning of the network. This knowledge was also included in the course.


This course contains a number of solutions that make it easier for you to learn.


Starting with presenting solutions to problems that you meet on your way during system configuration, through problems related to Nmap and Wireshark running on the same machine.

Ending with the presentation of iptables commands.

The commands in this course are additionally presented on the COMMAND BAR in a very large magnification so that you will never miss an error while reading them and copying them to your system.


The course also includes many useful tips on the blue boards that appear throughout the course.


Who Should Attend!

  • Anyone who likes to learn IT step by step from scratch.
  • Anyone who is interested in network security, firewalls, network attacks.
  • Anyone who would like to create their own network security analysis laboratory based on virtualization and iptables firewall and learn how to use it.

TAKE THIS COURSE

Tags

  • Cyber Security
  • Linux Security
  • Network Security
  • Security Hacking

Subscribers

2082

Lectures

62

TAKE THIS COURSE



Related Courses