Featured resource
2026 Tech Forecast
2026 Tech Forecast

Stay ahead of what’s next in tech with predictions from 1,500+ business leaders, insiders, and Pluralsight Authors.

Get these insights
  • Course

Protective Technology with Pi-hole

In this course, we will cover how to set up a Pi-Hole in your home or small business and block unwanted advertisements and tracking data about your internet-connected devices.

Intermediate
30m
(17)

Created by Colin Jackson

Last Updated Aug 12, 2022

Course Thumbnail
  • Course

Protective Technology with Pi-hole

In this course, we will cover how to set up a Pi-Hole in your home or small business and block unwanted advertisements and tracking data about your internet-connected devices.

Intermediate
30m
(17)

Created by Colin Jackson

Last Updated Aug 12, 2022

Get started today

Access this course and other top-rated tech content with one of our business plans.

Try this course for free

Access this course and other top-rated tech content with one of our individual plans.

This course is included in the libraries shown below:

  • Security
What you'll learn

In this course, Protective Technology with Pi-hole, you’ll cover how to utilize Pi-hole to secure a live network environment. First, you’ll demonstrate how to install and configure the Pi-Hole on your own network. Next, you’ll configure your Pi-Hole by adding blocklists, creating custom firewall rules, and visualizing your network traffic. Finally, learn about the built in reporting features and other things you can do with a Pi-Hole. When you’re finished with this course, you’ll have the skills and knowledge to identify, protect, detect, or respond to threats in your network systems.

Protective Technology with Pi-hole
Intermediate
30m
(17)
Table of contents

About the author
Colin Jackson - Pluralsight course - Protective Technology with Pi-hole
Colin Jackson
3 courses 4.9 author rating 31 ratings

Lockpicking got me into Physical Security and then from there, everything else opened up for me. I'm a Director over Security Operations and full-time blue-teamer doing security monitoring and incident response. I'm also a OSINT and Privacy enthusiast and love teaching others about security.

Get started with Pluralsight