Companies Home Search Profile

Protecting Your Network with Open-Source Software

Focused View

Jungwoo Ryoo

2:46:54

0 View
  • 01 - Protect your network with free and open-source software.mp4
    00:50
  • 02 - What you should know.mp4
    01:08
  • 03 - Environment setup.mp4
    02:30
  • 01 - What is open-source software.mp4
    02:46
  • 02 - Open-source software in networking.mp4
    03:39
  • 03 - Open-source solutions in cybersecurity.mp4
    03:08
  • 04 - Open-source vs. commercial software.mp4
    02:47
  • 05 - Costs and savings.mp4
    02:46
  • 01 - What is a firewall.mp4
    03:29
  • 02 - Host firewalls.mp4
    04:37
  • 03 - Network firewalls.mp4
    03:03
  • 04 - Static packet filtering vs. stateful packet inspection.mp4
    02:23
  • 05 - Challenge Disable UFW.mp4
    01:02
  • 06 - Solution Disable UFW.mp4
    00:40
  • 01 - Netfilter and iptables.mp4
    03:36
  • 02 - Setting up a host firewall using iptables.mp4
    06:20
  • 03 - Automating netfilter configuration.mp4
    05:31
  • 04 - Understanding hosts as routers.mp4
    02:24
  • 05 - Adding a network adapter.mp4
    03:21
  • 06 - Testing the second adapter.mp4
    01:34
  • 07 - Setting up IP forwarding.mp4
    04:12
  • 08 - Changing netfilter settings Part 1.mp4
    01:42
  • 09 - Changing netfilter settings Part 2.mp4
    06:35
  • 10 - Testing the router.mp4
    01:18
  • 01 - Setting up hosts as network firewalls.mp4
    03:16
  • 02 - Setting up a web server.mp4
    04:02
  • 03 - Port forwarding.mp4
    07:26
  • 04 - Testing port forwarding.mp4
    00:47
  • 05 - Understanding one-legged DMZ.mp4
    02:45
  • 06 - Understanding true DMZ.mp4
    01:39
  • 07 - Understanding an application proxy firewall.mp4
    03:55
  • 08 - Setting up Squid.mp4
    06:10
  • 09 - Challenge Fine-tuning the Squid configuration.mp4
    00:55
  • 10 - Solution Fine-tuning the Squid configuration.mp4
    02:47
  • 01 - What is packet analysis.mp4
    03:11
  • 02 - ARP poisoning example.mp4
    04:44
  • 03 - Packet capturing with Wireshark.mp4
    04:03
  • 04 - Exploring Wiresharks advanced features.mp4
    02:03
  • 05 - Wireshark hands-on.mp4
    03:18
  • 06 - Challenge Filtering with IP addresses and port numbers.mp4
    01:24
  • 07 - Solution Filtering with IP addresses and port numbers.mp4
    01:12
  • 01 - What is an IDS.mp4
    03:36
  • 02 - Introducing Snort.mp4
    03:25
  • 03 - Snort as a packet sniffer.mp4
    04:13
  • 04 - Snort as an IDS Establishing rules.mp4
    04:34
  • 05 - Snort as an IDS Detecting pings.mp4
    02:36
  • 06 - What is a network vulnerability assessment.mp4
    03:12
  • 07 - Nessus.mp4
    01:23
  • 08 - Network scanning with Nessus.mp4
    02:30
  • 01 - Logging.mp4
    01:33
  • 02 - syslog-ng.mp4
    02:09
  • 03 - Log forwarding Part 1.mp4
    02:38
  • 04 - Log forwarding Part 2.mp4
    05:37
  • 05 - Kiwi.mp4
    01:23
  • 06 - SNMP.mp4
    02:30
  • 01 - Next steps.mp4
    00:37
  • Description


    Network protection is vital to organizations big and small, but it doesn't have to be an expensive proposition. In this course, Jungwoo Ryoo—a professor who teaches IT, cyber security, and risk analysis at Penn State—shows you how to protect your network with open-source tools that are completely free. Find out how to set up firewalls, investigate network traffic with a packet analyzer, detect threats and malicious activities with an intrusion-detection system, and enable network logging and monitoring. Learn about new trends in network protection and dive into demonstrations, case studies, and hands-on challenges. This course enables you to explore a low-cost route to a more secure network.

    More details


    User Reviews
    Rating
    0
    0
    0
    0
    0
    average 0
    Total votes0
    Focused display
    Jungwoo Ryoo
    Jungwoo Ryoo
    Instructor's Courses
    I aspire to be a servant leader with compassion. I have the honor and pleasure of serving as the Chancellor and Chief Academic Officer (CAO) at Penn State DuBois. I am blessed with my academic appointment as Professor of Information Sciences and Technology. My research interests include information assurance and security, software engineering, computer networking, and data science. In addition to my core academic research, I conduct research in innovative learning environments (ILEs) to promote justice, equity, diversity, and inclusion (JEDI) in Science, Technology, Engineering, and Math (STEM) higher education. Many of my research projects have been funded by state and federal government agencies. I received more than 1.5 million dollars in total external funding. I have substantial industry experience architecting and implementing secure, high-performance software solutions for large-scale network management systems. Specialties: Software Engineering, Cybersecurity, Information Assurance, Networking, and Data Science
    LinkedIn Learning is an American online learning provider. It provides video courses taught by industry experts in software, creative, and business skills. It is a subsidiary of LinkedIn. All the courses on LinkedIn fall into four categories: Business, Creative, Technology and Certifications. It was founded in 1995 by Lynda Weinman as Lynda.com before being acquired by LinkedIn in 2015. Microsoft acquired LinkedIn in December 2016.
    • language english
    • Training sessions 56
    • duration 2:46:54
    • English subtitles has
    • Release Date 2024/12/14