Protective Technology with Pi-hole
.MP4, AVC, 1920x1080, 30 fps | English, AAC, 2 Ch | 31m | 89.9 MB
Instructor: Colin Jackson
.MP4, AVC, 1920x1080, 30 fps | English, AAC, 2 Ch | 31m | 89.9 MB
Instructor: Colin Jackson
In this course, we will cover how to set up a Pi-Hole in your home or small business and block unwanted advertisements and tracking data about your internet-connected devices.
In this course, Protective Technology with Pi-hole, you’ll cover how to utilize Pi-hole to secure a live network environment. First, you’ll demonstrate how to install and configure the Pi-Hole on your own network. Next, you’ll configure your Pi-Hole by adding blocklists, creating custom firewall rules, and visualizing your network traffic. Finally, learn about the built in reporting features and other things you can do with a Pi-Hole. When you’re finished with this course, you’ll have the skills and knowledge to identify, protect, detect, or respond to threats in your network systems.