Companies Home Search Profile

Protecting Your Network with Open-Source Software

Focused View

Jungwoo Ryoo

2:35:31

0 View
  • 001 Protect your network with free software.mp4
    01:08
  • 002 What you should know.mp4
    01:14
  • 003 Set up environment.mp4
    03:30
  • 001 What is open-source software .mp4
    02:33
  • 002 Open-source software in networking.mp4
    03:22
  • 003 Open-source solutions in cybersecurity.mp4
    03:09
  • 004 Open-source vs. commercial software.mp4
    02:43
  • 005 Costs and savings.mp4
    02:31
  • 001 What is a firewall .mp4
    03:20
  • 002 Host firewalls.mp4
    03:57
  • 003 Network firewalls.mp4
    02:55
  • 004 Static packet filtering vs. stateful packet inspection.mp4
    02:18
  • 001 Netfilter and iptables.mp4
    03:00
  • 002 Setting up a host firewall using iptables.mp4
    05:24
  • 003 Automating Netfilter configuration.mp4
    05:17
  • 004 Understanding hosts as routers.mp4
    02:30
  • 005 Adding a network adapter.mp4
    03:49
  • 006 Testing the second adapter.mp4
    02:20
  • 007 Setting up IP forwarding.mp4
    03:55
  • 008 Changing Netfilter settings.mp4
    06:37
  • 009 Testing the router.mp4
    01:21
  • 001 Setting up hosts as a network firewall.mp4
    03:11
  • 002 Setting up a web server.mp4
    03:41
  • 003 Port forwarding.mp4
    05:28
  • 004 Testing port forwarding.mp4
    00:33
  • 005 Understanding one-legged DMZ.mp4
    02:44
  • 006 Understanding true DMZ.mp4
    01:32
  • 007 Understanding an application proxy firewall.mp4
    04:00
  • 008 Setting up Squid.mp4
    05:16
  • 001 What is packet analysis .mp4
    02:59
  • 002 ARP poisoning example.mp4
    04:05
  • 003 Packet capturing with Wireshark.mp4
    03:52
  • 004 Exploring Wireshark advanced features.mp4
    03:04
  • 005 Wireshark hands-on.mp4
    03:40
  • 001 What is an IDS .mp4
    03:21
  • 002 Introducing Snort.mp4
    03:00
  • 003 Snort as a packet sniffer.mp4
    04:19
  • 004 Snort as an IDS Establishing rules.mp4
    05:01
  • 005 Snort as an IDS Detecting pings.mp4
    02:10
  • 006 What is a network vulnerability assessment .mp4
    03:22
  • 007 Nessus.mp4
    02:38
  • 008 Network scanning with Nessus.mp4
    02:30
  • 001 Logging.mp4
    01:36
  • 002 Syslog-ng.mp4
    02:23
  • 003 Log forwarding Part 1.mp4
    03:04
  • 004 Log forwarding Part 2.mp4
    06:30
  • 005 Kiwi.mp4
    01:16
  • 006 SNMP.mp4
    02:42
  • 001 Next steps and additional resources.mp4
    00:41
  • Description


    Network protection is vital to organizations big and small, but it doesn't have to be an expensive proposition. In this course, Jungwoo Ryoo—a professor who teaches IT, cyber security, and risk analysis at Penn State—shows you how to protect your network with open-source tools that are completely free. Find out how to set up firewalls, investigate network traffic with a packet analyzer, detect threats and malicious activities with an intrusion-detection system, and enable network logging and monitoring. Learn about new trends in network protection and dive into demonstrations, case studies, and hands-on challenges. This course enables you to explore a low-cost route to a more secure network.

    More details


    User Reviews
    Rating
    0
    0
    0
    0
    0
    average 0
    Total votes0
    Focused display
    Category
    Jungwoo Ryoo
    Jungwoo Ryoo
    Instructor's Courses
    I aspire to be a servant leader with compassion. I have the honor and pleasure of serving as the Chancellor and Chief Academic Officer (CAO) at Penn State DuBois. I am blessed with my academic appointment as Professor of Information Sciences and Technology. My research interests include information assurance and security, software engineering, computer networking, and data science. In addition to my core academic research, I conduct research in innovative learning environments (ILEs) to promote justice, equity, diversity, and inclusion (JEDI) in Science, Technology, Engineering, and Math (STEM) higher education. Many of my research projects have been funded by state and federal government agencies. I received more than 1.5 million dollars in total external funding. I have substantial industry experience architecting and implementing secure, high-performance software solutions for large-scale network management systems. Specialties: Software Engineering, Cybersecurity, Information Assurance, Networking, and Data Science
    LinkedIn Learning is an American online learning provider. It provides video courses taught by industry experts in software, creative, and business skills. It is a subsidiary of LinkedIn. All the courses on LinkedIn fall into four categories: Business, Creative, Technology and Certifications. It was founded in 1995 by Lynda Weinman as Lynda.com before being acquired by LinkedIn in 2015. Microsoft acquired LinkedIn in December 2016.
    • language english
    • Training sessions 49
    • duration 2:35:31
    • Release Date 2025/02/11