Featured resource
pluralsight tech forecast
2025 Tech Forecast

Which technologies will dominate in 2025? And what skills do you need to keep up?

Check it out
Hamburger Icon
  • Course
    • Libraries: If you want this course, consider one of these libraries.
    • Security

Protective Technology with Pi-hole

In this course, we will cover how to set up a Pi-Hole in your home or small business and block unwanted advertisements and tracking data about your internet-connected devices.

Colin Jackson - Pluralsight course - Protective Technology with Pi-hole
by Colin Jackson

What you'll learn

In this course, Protective Technology with Pi-hole, you’ll cover how to utilize Pi-hole to secure a live network environment. First, you’ll demonstrate how to install and configure the Pi-Hole on your own network. Next, you’ll configure your Pi-Hole by adding blocklists, creating custom firewall rules, and visualizing your network traffic. Finally, learn about the built in reporting features and other things you can do with a Pi-Hole. When you’re finished with this course, you’ll have the skills and knowledge to identify, protect, detect, or respond to threats in your network systems.

Table of contents

About the author

Colin Jackson - Pluralsight course - Protective Technology with Pi-hole
Colin Jackson

Lockpicking got me into Physical Security and then from there, everything else opened up for me. I'm a Director over Security Operations and full-time blue-teamer doing security monitoring and incident response. I'm also a OSINT and Privacy enthusiast and love teaching others about security.

More Courses by Colin