Featured resource
2025 Tech Upskilling Playbook
Tech Upskilling Playbook

Build future-ready tech teams and hit key business milestones with seven proven plays from industry leaders.

Check it out
  • Course
    • Libraries: If you want this course, consider one of these libraries.
    • Security

Protective Technology with Pi-hole

In this course, we will cover how to set up a Pi-Hole in your home or small business and block unwanted advertisements and tracking data about your internet-connected devices.

What you'll learn

In this course, Protective Technology with Pi-hole, you’ll cover how to utilize Pi-hole to secure a live network environment. First, you’ll demonstrate how to install and configure the Pi-Hole on your own network. Next, you’ll configure your Pi-Hole by adding blocklists, creating custom firewall rules, and visualizing your network traffic. Finally, learn about the built in reporting features and other things you can do with a Pi-Hole. When you’re finished with this course, you’ll have the skills and knowledge to identify, protect, detect, or respond to threats in your network systems.

Table of contents

Get access now

Sign up to get immediate access to this course plus thousands more you can watch anytime, anywhere.

Get started with Pluralsight