Ethical Hacker: Evading IDS, Firewall, & Honeypots

Ethical Hacker 10    |    Intermediate
  • 2 videos | 1h 8m 45s
  • Includes Assessment
  • Earns a Badge
Rating 4.7 of 21 users Rating 4.7 of 21 users (21)
Explore how to evade intrusion detection systems, firewalls, and honeypots, as you prepare for the 312-50: Certified Ethical Hacker v10 exam. Watch these videos and learn how to interpret IDS alerts from IDS statements, specify NAT devices that filter traffic and set security policies, and recall more techniques to gather information about an intruder. From there, you will learn how to recite best practices to configure a honeypot, explain the use of several honeypots on a network, describe a method to scan a specified honeypot with NMAP, and list more methods to scan honeypots.

WHAT YOU WILL LEARN

  • Describe nat devices that help to filter traffic and set security policies
    describe ids alerts when reading ids statements
    describe more techniques to gather information regarding an intruder
    Describe best practices when configuring honeypot
  • describe a method of scanning a specified honeypot with nmap
    describe the use of several honeypots on a network
    describe more methods of scanning honeypots

IN THIS COURSE

  • Locked
    1.  Evading IDS, Firewall, and Honeypots
    32m 51s
  • Locked
    2.  Evading IDS, Firewall, and Honeypots Part 2
    35m 55s

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

PEOPLE WHO VIEWED THIS ALSO VIEWED THESE

Rating 4.7 of 26 users Rating 4.7 of 26 users (26)
Rating 4.6 of 28 users Rating 4.6 of 28 users (28)
Rating 4.6 of 16 users Rating 4.6 of 16 users (16)