Tags
Language
Tags
December 2024
Su Mo Tu We Th Fr Sa
1 2 3 4 5 6 7
8 9 10 11 12 13 14
15 16 17 18 19 20 21
22 23 24 25 26 27 28
29 30 31 1 2 3 4

Protective Technology with Pi-hole

Posted By: IrGens
Protective Technology with Pi-hole

Protective Technology with Pi-hole
.MP4, AVC, 1920x1080, 30 fps | English, AAC, 2 Ch | 31m | 89.9 MB
Instructor: Colin Jackson

In this course, we will cover how to set up a Pi-Hole in your home or small business and block unwanted advertisements and tracking data about your internet-connected devices.

In this course, Protective Technology with Pi-hole, you’ll cover how to utilize Pi-hole to secure a live network environment. First, you’ll demonstrate how to install and configure the Pi-Hole on your own network. Next, you’ll configure your Pi-Hole by adding blocklists, creating custom firewall rules, and visualizing your network traffic. Finally, learn about the built in reporting features and other things you can do with a Pi-Hole. When you’re finished with this course, you’ll have the skills and knowledge to identify, protect, detect, or respond to threats in your network systems.


Protective Technology with Pi-hole