Comprehensive DNS Security and DNSSEC
- IT & Software
- Dec 06, 2024

Comprehensive DNS Security and DNSSEC, available at $39.99, has an average rating of 4.5, with 28 lectures, 4 quizzes, based on 47 reviews, and has 1286 subscribers.
You will learn about You will learn DNS protocol architecture. You willl understand DNS security mechanisms such as DNSSEC, RPZ, ACL, Chroot, etc. You wlll dive into DNS Security Extensions, or DNSSEC. You will explore DNS Attacks such as DDoS, DNS amplification, cache poisoning, website defacing, etc. You will see the best practices for configuring and securing DNS. Youll be configuring BIND DNS as a resolver server and as an authoritative server with a focus on security. This course is ideal for individuals who are Information Security Professionals or Network Engineers or IT Architects or Security Managers or Infrastructure Engineers It is particularly useful for Information Security Professionals or Network Engineers or IT Architects or Security Managers or Infrastructure Engineers.
Enroll now: Comprehensive DNS Security and DNSSEC
Summary
Title: Comprehensive DNS Security and DNSSEC
Price: $39.99
Average Rating: 4.5
Number of Lectures: 28
Number of Quizzes: 4
Number of Published Lectures: 26
Number of Published Quizzes: 2
Number of Curriculum Items: 32
Number of Published Curriculum Objects: 28
Original Price: $109.99
Quality Status: approved
Status: Live
What You Will Learn
Who Should Attend
Target Audiences
Welcome to the “Comprehensive DNS Security and DNSSEC” course.
In this course, you will learn the foundation of the Domain Name System, how it works and how to make it secure. You’ll learn DNS functions, DNS history, DNS structure and architecture and DNS security.
You will learn the difference between authoritative DNS and recursive DNS.
You will understand what is a zone file and what is a reverse zone file.
You will see the most common attacks against DNS systems and how to secure your infrastructure.
You will understand BINDDNS configuration as a recursive server as well as as an authoritative server.
We will cover the techniques used to target DNS systems as well as those that take advantage of the DNS system to carry out a malicious activity. Examples include:
Fingerprinting the DNS
Distributed Denial-of-Service (DDoS) against DNS.
DNS Spoofing
DNS Amplification attacks
Cache poisoning
Domain hijacking
You will learn to use different command line tools and utilities, such as whois, dig, hping3, fpdns, etc.
You will learn to readthe DNS packet information, such as the header, the answer section, and the additional information section.
You will be able to understand the security and filtering on incoming requests using Response Policy Zones, and tracking down bad domains.
You will discover DNSSEC, the framework that is being adopted to sign and secure DNS communications. TSIG is also covered in this course.
This course will be kept updated with relevant material when the students ask for it. So, don’t hesitate to leave a message. Feel free to suggest topics you’d like to understand more.
For more information don’t hesitate to ask in the Q&A section, I’ll be happy to help.
Please leave feedback.
I wish you a happy learning experience.
Thank you for choosing this course.
Taoufik Znibae
Course Curriculum
Chapter 1: DNS Protocol Overview
Lecture 1: Course Overview
Lecture 2: DNS History
Lecture 3: DNS Architecture
Lecture 4: DNS Zone File
Lecture 5: DNS Reverse Zone
Lecture 6: Whois
Lecture 7: DNS Packet – Part 1
Lecture 8: DNS Packet – Part 2
Chapter 2: Fundamental DNS Security
Lecture 1: DNS Security Considerations
Lecture 2: DNS Security Considerations 2
Lecture 3: DNS Configuration Errors to Avoid
Lecture 4: Tracking Down Bad Domains
Lecture 5: Securing DNS: RPZs
Lecture 6: DNS Fingerprinting
Lecture 7: Common DNS Attacks
Lecture 8: DNS Cache Poisoning
Lecture 9: Cache Poisoning with Subdomains
Lecture 10: DNS-based Denial of Service (DoS)
Lecture 11: DNS Amplification
Lecture 12: Activity: Configuring A Recursive Server
Lecture 13: Activity: Configuring An Authoritative Server
Lecture 14: BIND DNS Security
Lecture 15: DNSSEC Part 1
Lecture 16: DNSSEC Part 2
Chapter 3: Bonus Videos and Thanks
Lecture 1: Bonus Video: TSIG
Lecture 2: Thank you
Instructors

Taoufik Z.
Cyber Security Expert and Researcher
Rating Distribution
Frequently Asked Questions
How long do I have access to the course materials?
You can view and review the lecture materials indefinitely, like an on-demand channel.
Can I take my courses with me wherever I go?
Definitely! If you have an internet connection, courses on Udemy are available on any device at any time. If you don’t have an internet connection, some instructors also let their students download course lectures. That’s up to the instructor though, so make sure you get on their good side!
- Random Picks
- Popular
- Hot Reviews
- Learn to create custom QR codes with colour and images
- Google Adwords for Beginners
- Life Insurance Annuity Ultimate Buyer’s Guide
- Crypto Trading Mastery (Scalping, Day trading, price action)
- Personal Finance
- Company Valuation Financial Modeling
- How to Draw Cute Thanksgiving!
- Step-By-Step Stock Market Analysis and Real-Time Trades
- 1ZB Trading Cryptocurrency Price Action Course
- 2Python for Absolute Beginners
- 3YouTube Masterclass The Best Guide to YouTube Success
- 4NGRX angular nativescript
- 5AS1 Tosca Practice for Interviews and new learners
- 6Marketing Mix Modeling in one day for your Brand Analytics_1
- 7Top 10 Machine Learning Courses to Learn in November 2024
- 8Top 10 3d Modeling Courses to Learn in November 2024
- 1Linux Performance Monitoring Analysis Hands On !!
- 2Content Writing Mastery 1- Content Writing For Beginners
- 3Media Training for PrintOnline Interviews-Get Great Quotes
- 4Learn Facebook Ads from Scratch Get more Leads and Sales
- 5The Complete Digital Marketing Course Learn From Scratch
- 6C#- Start programming with C# (for complete beginners)
- 7[FREE] How to code 10 times faster with Emmet
- 8Driving Results through Data Storytelling