Lynda_Protect_Your_Network_with_Open-Source_Software

در این آموزش تصویری نحوه محافظت از شبکه با استفاده از نرم افزار های متن باز و رایگان را فرامیگیرید.

این دوره آموزشی محصول موسسه Lynda  می باشد.

سرفصل های دوره:

  • آشنایی با فایروال 
  • فایروال چیست؟
  • Host به عنوان Router
  • استفاده از iptables برای راه اندازی یک فایروال
  • آشنایی با میزبان به عنوان روتر
  • کار با Host به عنوان Firewall
  • راه اندازی یک وب سرور برای دریافت بسته های فرستاده
  • استفاده از iptables برای راه اندازی یک DMZ
  • کار با رویتر Ubuntu
  • تجزیه و تحلیل بسته چیست؟
  • گرفتن بسته با Wireshark
  • ویژگی های پیشرفته Wireshark
  • تشخیص نفوذ سیستم (IDS) و ارزیابی آن
  • IDS چیست؟
  • معرفی snort
  • کار با Nessus
  • ورود به سیستم و مانیتورینگ
  • کار با پروتکل مدیریت شبکه ساده (SNMP)
  • و…

عنوان دوره: Lynda Protect Your Network with Open-Source Software
سطح: مقدماتی
مدت زمان: 1 ساعت و 49 دقیقه
نویسنده: Jungwoo Ryoo

توضیحات:

Network protection is vital to organizations big and small, but it doesn't have to be an expensive proposition. Learn how to protect your network with open-source tools, and do it completely FREE. Jungwoo Ryoo shows how to set up firewalls, investigate network traffic with a packet analyzer, detect threats and malicious activity with an intrusion-detection system, and enable network logging and monitoring. Start here for a low-cost route to a more secure network.
Topics include:
Setting up a host firewall
Setting up a host as a network firewall
Setting up a DMZ
Capturing and analyzing packets with Wireshark
Using Snort to detect network intrusions
Logging network activity with syslog-ng, Kiwi, and other solutions
Setting up a simple network management protocol (SNMP)

Introduction
1m 46s
    Welcome
        43s 
    What you should know before watching this course
        1m 3s 
1. Understanding Firewalls
9m 58s
    What is a firewall?
        2m 26s 
    A host firewall
        2m 42s 
    A network firewall
        2m 41s 
    Static packet filtering (SPF) vs. stateful packet inspection (SPI)
        2m 9s 
2. Host as a Router
29m 46s
    Netfilter and iptables
        2m 26s 
    Using iptables to set up a host firewall
        5m 46s 
    Creating a shell script to automate configuring Netfilter
        4m 39s 
    Understanding hosts as routers
        1m 57s 
    Host as a router: Including an additional network adapter
        3m 55s 
    Host as a router: Setting up a second host to test the router
        2m 48s 
    Host as a router: Setting up IP forwarding
        2m 35s 
    Host as a router: Configuring the router's Netfilter settings
        4m 4s 
    Host as a router: Testing
        1m 36s 
3. Host as a Firewall
24m 26s
    Understanding using a host as a network firewall
        2m 24s 
    Setting up a web server to receive forwarded packets
        1m 0s 
    Configuring port forwarding by adding Netfilter rules
        3m 49s 
    Testing port forwarding
        1m 13s 
    Understanding one-legged demilitarized zones (DMZs) using iptables
        2m 7s 
    Using iptables to set up a one-legged DMZ
       2m 3s 
    Using iptables to set up a true DMZ
        1m 10s 
    Understanding Squid, an application proxy firewall
        2m 14s 
    Setting up Squid
        3m 33s 
    Fine-tuning the Ubuntu router host
        4m 53s 
4. Packet Analysis
13m 5s
    What is a packet analysis?
        1m 59s 
    Packet-analysis applications in network security: ARP poisoning example
        3m 43s 
    Packet capturing with Wireshark
        3m 16s 
    Exploring Wireshark's advanced features
        1m 17s 
    Demonstrating Wireshark's advanced features
        2m 50s 
5. Intrusion Detection Systems (IDS) and Vulnerability Assessment
17m 33s
    What is an IDS?
        1m 57s 
    Introducing Snort
        1m 28s 
    Snort as a packet sniffer
        3m 8s 
    Snort as an IDS: Establishing rules
        3m 16s 
    Snort as an IDS: Detecting pings
        2m 25s 
    What is network vulnerability assessment?
        2m 41s 
    Nessus
        1m 6s 
    Network scanning with Nessus
        1m 32s 
6. Logging and Monitoring
11m 55s
    Logging and its significance
        1m 10s 
    Syslog-ng
        51s 
    Log forwarding using syslog-ng: Part one
        2m 30s 
    Log forwarding using syslog-ng: Part two
        4m 10s 
    Kiwi
        1m 31s 
    Simple Network Management Protocol (SNMP)
        1m 43s 
Conclusion
37s
    Next steps
        37s

حجم فایل: 215MB