Simple play icon Course

Protective Technology with Pi-hole

by Colin Jackson

In this course, we will cover how to set up a Pi-Hole in your home or small business and block unwanted advertisements and tracking data about your internet-connected devices.

What you'll learn

In this course, Protective Technology with Pi-hole, you’ll cover how to utilize Pi-hole to secure a live network environment. First, you’ll demonstrate how to install and configure the Pi-Hole on your own network. Next, you’ll configure your Pi-Hole by adding blocklists, creating custom firewall rules, and visualizing your network traffic. Finally, learn about the built in reporting features and other things you can do with a Pi-Hole. When you’re finished with this course, you’ll have the skills and knowledge to identify, protect, detect, or respond to threats in your network systems.

About the author

Lockpicking got me into Physical Security and then from there, everything else opened up for me. I'm a full-time blue-teamer doing security monitoring and incident response. I'm also a OSINT and Privacy enthusiast and love teaching others about security.

Ready to upskill? Get started