Network Security
Section 3: Routers - Port & Vulnerability Scanning
- The Home Router
- External Vulnerability Scanning - Shodan, Qualys & Nmap
- Internal Vulnerability Scanning - MBSA, Nmap, Nessus, Fing & Superscan & OpenVAS
- Open Source Custom Router Firmware
Section 4: Firewalls
- Firewalls - Host-based, network based and virtual
- Windows - Host Based Firewalls
- Windows Firewall Control (WFC)
- Third Party
- Linux - Host Based Firewalls
- iptables
- UFW, gufw & nftables
- Network Based Firewalls
- Routers - DD-WRT
- Hardware
- pfSense, Smoothwall and Vyos
Section 5: Network Attacks, Architecture & Isolation
- Network Attacks & Network Isolation
- Introduction & IOT
- Arp Spoofing & Switches
- Effective Network Isolation
Section 6: Wireless & Wifi Security
- Wifi Weaknesses
- WPA, WPA2, TKIP & CCMP
- Wifi Protected Setup WPS, Evil Twin & Rouge AP
- Wifi Security Testing
- Wireless Security
- Secure Configuration & Network Isolation
- RF Isolation & Reduction
- Who is on my Wifi Network?
Section 7: Network Monitoring for Threats
- Syslog
- Network Monitoring
- Wireshark, tcpdump, tshark, iptables
- Wireshark - Finding malware & hackers
- Wincap, NST, Netminer & NetWorx
Section 8: How we are Tracked Online
- IP Address
- HTTP Referer
- Super Cookies
- Browser Fingerprinting & Browser Volunteered Information
- Browser & Browser Functionality
- More Tracking
- Browser & Internet Profiling
Section 9: Search Engines & Privacy
- Search Engine Tracking, Censorship & Privacy
- Ixquick & StartPage
- DuckDuckGo
- Disconnect Search
- YaCy
- Private & Anonymous Searching
Section 10: Browser Security & Tracking Prevention
- Reducing the Browser Attack Surface
- Browser Isolation & Compartmentalization
- Firefox Security, Privacy & Tracking
- HTTP Filters, ad and track blockers
- uBlock origin
- uMatrix
- Disconnect, Ghostery, Request policy (n/a)
- Adblock plus (ABP), Privacy badger, Web of Trust (WOT)
- NoScript
- Policeman (n/a) & Others
- History, Cookies & Super cookies
- HTTP Referer
- Browser Fingerprinting
- Certificates & Encryption
- Firefox Hardening
Section 11: Passwords & Authentication Methods
- Password Attacks
- How Passwords are Cracked
- Operating System Passwords
- Password Managers
- Introduction
- Master Password
- KeePass, KeePassX and KeyPassXC
- LastPass
- Creating a Strong Password that you can Remember
- Multi-Factor Authentication
- Soft Tokens - Google Authenticator & Authy
- Hard Tokens - 2FA Dongles
- Choosing a Method of Multi-Factor Authentication
- Multi-Factor Authentication - Strengths & Weaknesses
- The Future of Password & Authentication