Network security
Network security
Learn about the open-source threat detection engine that is an intrusion detection system (IDS) and an intrusion prevention system (IPS).
March 04, 2022
Mark Viglione
Network security
Learn intrusion detection systems fundamentals and some of the best practices behind maintaining and tuning them.
February 28, 2022
Mark Viglione
Network security
Gain fundamental knowledge of intrusion detection and learn why it's crucial for network and endpoint security.
February 25, 2022
Mark Viglione
Network security
Learn how to analyze network traffic with the free protocol analyzer Wireshark and sniffing tool tcpdump. Then try it yourself!
August 23, 2021
Jeff Peters
Network security
Network security is important for every organization, no matter how big or small. Here are some best practices.
June 23, 2021
Nitesh Malviya
Network security
Whether you're using Skype, Zoom or a custom-built system, securing voice communications is an important component of security.
June 11, 2021
Kurt Ellzey
Network security
Learn all about SIEM, a software system that collects and aggregates data and events from various networking devices and resources.
May 27, 2021
Nitesh Malviya
Network security
What types of VPNs are available and how do they work. Learn about remote access VPNs, site-to-site VPNs, secure shell and more.
May 25, 2021
Kurt Ellzey
Network security
Despite their seemingly endless coverage (your mileage will definitely vary), cellular network security has proven to be surprisingly robust over the years.
March 23, 2021
Kurt Ellzey
Network security
For a very long time, having devices just work on a network was a feat in itself. This meant that the protocols involved didn't necessarily need to be secure
March 22, 2021
Kurt EllzeyNetwork Security Fundamentals
Learn the fundamentals of networking and how to secure your networks with seven hands-on courses. What you'll learn:- Models and protocols
- Networking best practices
- Wireless and mobile security
- Network security tools
- And more
In this series
- What is zero trust architecture (ZTA)? Pillars of zero trust and trends for 2024
- A deep dive into network security protocols: Safeguarding digital infrastructure 2024
- Asset mapping and detection: How to implement the nuts and bolts
- The Pentagon goes all-in on Zero Trust
- How to configure a network firewall: Walkthrough
- 4 network utilities every security pro should know: Video walkthrough
- How to use Nmap and other network scanners
- Security engineers: The top 13 cybersecurity tools you should know
- Converting a PCAP into Zeek logs and investigating the data
- Using Zeek for network analysis and detections
- Suricata: What is it and how can we use it
- Intrusion detection software best practices
- What is intrusion detection?
- How to use Wireshark for protocol analysis: Video walkthrough
- 9 best practices for network security
- Securing voice communications
- Introduction to SIEM (security information and event management)
- VPNs and remote access technologies
- Cellular Networks and Mobile Security
- Secure network protocols
- Network security (101)
- IDS/IPS overview
- Exploiting built-in network protocols for DDoS attacks
- Firewall types and architecture
- Wireless attacks and mitigation
- Wireless network overview
- Open source IDS: Snort or Suricata? [updated 2021]
- PCAP analysis basics with Wireshark [updated 2021]
- What is a firewall: An overview
- NSA report: Indicators of compromise on personal networks
- Securing the home office: Printer security risks (and mitigations)
- Email security
- Data integrity and backups
- Cost of non-compliance: 8 largest data breach fines and penalties
- How to find weak passwords in your organization’s Active Directory
- Monitoring business communication tools like Slack for data infiltration risks
- Firewalls and IDS/IPS
- IPv4 and IPv6 overview
- The OSI model and TCP/IP model
- Endpoint hardening (best practices)
- Wireless Networks and Security
- Networking fundamentals (for network security professionals)
- How your home network can be hacked and how to prevent it
- Network design: Firewall, IDS/IPS
- Work-from-home network traffic spikes: Are your employees vulnerable?
- RTS threshold configuration for improved wireless network performance [updated 2020]
- Web server protection: Web server security monitoring
- Web server security: Active defense
- Web server security: Infrastructure components
- Web server protection: Web application firewalls for web server protection
Get certified and advance your career!
- Exam Pass Guarantee
- Live instruction
- CompTIA, ISACA, ISC2, Cisco, Microsoft and more!