-
Course
- Security
Protective Technology with Pi-hole
In this course, we will cover how to set up a Pi-Hole in your home or small business and block unwanted advertisements and tracking data about your internet-connected devices.
What you'll learn
In this course, Protective Technology with Pi-hole, you’ll cover how to utilize Pi-hole to secure a live network environment. First, you’ll demonstrate how to install and configure the Pi-Hole on your own network. Next, you’ll configure your Pi-Hole by adding blocklists, creating custom firewall rules, and visualizing your network traffic. Finally, learn about the built in reporting features and other things you can do with a Pi-Hole. When you’re finished with this course, you’ll have the skills and knowledge to identify, protect, detect, or respond to threats in your network systems.
Table of contents
About the author
Lockpicking got me into Physical Security and then from there, everything else opened up for me. I'm a Director over Security Operations and full-time blue-teamer doing security monitoring and incident response. I'm also a OSINT and Privacy enthusiast and love teaching others about security.
More Courses by Colin