Ethical Hacker: Secure Technology & Applications
Intermediate
- 10 videos | 40m 51s
- Includes Assessment
- Earns a Badge
Security devices and software are the technical aspect of security. An ethical hacker must be familiar with security technology in order to effectively conduct tests of the target organization's network. In this 10-video course, you will explore firewall types and usage, SIEM systems, intrusion detection systems and intrusion prevention systems (IDS/IPS), antivirus strategies, Windows Firewall, and how to implement Snort. Key concepts covered in this course include security devices and software concepts, and how they relate to ethical hacking; learning to correctly deploy firewall solutions, their relevance to ethical hacking, and different types and usage; and learning the role of SIEM (security information and event management) and how to deploy SIEM systems. Next, learners observe how to utilize IDS/IPS and its relationship to ethical hacking; learn antivirus concepts and implement an AV strategy; configure the firewall in Windows 10 and Windows Server 2019; and learn to configure Windows Defender. Conclude by learning how to implement basic Snort network IDS, a tool that can be used for simple packet capture or for IDS.
WHAT YOU WILL LEARN
-
Discover the key concepts covered in this courseDescribe security devices and how they relate to ethical hackingCorrectly deploy firewall solutions and describe their relevance to ethical hackingDescribe the usage of siem and deploy siem systemsDescribe and utilize ids/ips and describe its relation to ethical hacking
-
Describe antivirus concepts and implement an av strategyConfigure the firewall in windows 10 and windows server 2019Configure windows defenderImplement basic snort idsSummarize the key concepts covered in this course
IN THIS COURSE
-
1m 20s
-
4m 21sAfter completing this video, you will be able to describe security devices and how they relate to ethical hacking. FREE ACCESS
-
6m 18sIn this video, you will deploy firewall solutions correctly and describe their relevance to ethical hacking. FREE ACCESS
-
3m 49sUpon completion of this video, you will be able to describe the usage of SIEM and deploy SIEM systems. FREE ACCESS
-
5m 32sUpon completion of this video, you will be able to describe and utilize IDS/IPS and describe its relation to ethical hacking. FREE ACCESS
-
3m 29sUpon completion of this video, you will be able to describe antivirus concepts and implement an antivirus strategy. FREE ACCESS
-
5m 31sIn this video, you will configure the firewall in Windows 10 and Windows Server 2019. FREE ACCESS
-
4m 21sIn this video, you will learn how to configure Windows Defender. FREE ACCESS
-
4m 54sIn this video, learn how to implement a basic Snort IDS. FREE ACCESS
-
1m 17s
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.
Digital badges are yours to keep, forever.