Featured resource
2026 Tech Forecast
2026 Tech Forecast

Stay ahead of what’s next in tech with predictions from 1,500+ business leaders, insiders, and Pluralsight Authors.

Get these insights
  • Course
    • Libraries: If you want this course, consider one of these libraries.
    • Security

Protective Technology with Pi-hole

In this course, we will cover how to set up a Pi-Hole in your home or small business and block unwanted advertisements and tracking data about your internet-connected devices.

Colin Jackson - Pluralsight course - Protective Technology with Pi-hole
Colin Jackson
What you'll learn

In this course, Protective Technology with Pi-hole, you’ll cover how to utilize Pi-hole to secure a live network environment. First, you’ll demonstrate how to install and configure the Pi-Hole on your own network. Next, you’ll configure your Pi-Hole by adding blocklists, creating custom firewall rules, and visualizing your network traffic. Finally, learn about the built in reporting features and other things you can do with a Pi-Hole. When you’re finished with this course, you’ll have the skills and knowledge to identify, protect, detect, or respond to threats in your network systems.

Table of contents

About the author
Colin Jackson - Pluralsight course - Protective Technology with Pi-hole
Colin Jackson

Lockpicking got me into Physical Security and then from there, everything else opened up for me. I'm a Director over Security Operations and full-time blue-teamer doing security monitoring and incident response. I'm also a OSINT and Privacy enthusiast and love teaching others about security.

Get access now

Sign up to get immediate access to this course plus thousands more you can watch anytime, anywhere.

Get started with Pluralsight