Protective Technology with Pi-hole
In this course, we will cover how to set up a Pi-Hole in your home or small business and block unwanted advertisements and tracking data about your internet-connected devices.
What you'll learn
In this course, Protective Technology with Pi-hole, you’ll cover how to utilize Pi-hole to secure a live network environment. First, you’ll demonstrate how to install and configure the Pi-Hole on your own network. Next, you’ll configure your Pi-Hole by adding blocklists, creating custom firewall rules, and visualizing your network traffic. Finally, learn about the built in reporting features and other things you can do with a Pi-Hole. When you’re finished with this course, you’ll have the skills and knowledge to identify, protect, detect, or respond to threats in your network systems.
Table of contents
- What Is Pi-hole? 2m
- NIST CSF 0m
- DNS and Raspberry Pi 4m
- Installing Raspberry Pi OS and Pi-hole 2m
- Demo: Installation 2m
- Configuring DNS and DHCP on Router 4m
- Adding Blocklists 0m
- Demo: Blocklists 2m
- Demo: Whitelist_Blacklists 1m
- CLI 3m
- Pi-hole Visualizations and Dashboards 6m
- Further Considerations 2m
- Corporate Applications 1m