Ethical Hacker: Secure Technology & Applications

Intermediate
  • 10 videos | 40m 51s
  • Includes Assessment
  • Earns a Badge
Rating 4.4 of 37 users Rating 4.4 of 37 users (37)
Security devices and software are the technical aspect of security. An ethical hacker must be familiar with security technology in order to effectively conduct tests of the target organization's network. In this 10-video course, you will explore firewall types and usage, SIEM systems, intrusion detection systems and intrusion prevention systems (IDS/IPS), antivirus strategies, Windows Firewall, and how to implement Snort. Key concepts covered in this course include security devices and software concepts, and how they relate to ethical hacking; learning to correctly deploy firewall solutions, their relevance to ethical hacking, and different types and usage; and learning the role of SIEM (security information and event management) and how to deploy SIEM systems. Next, learners observe how to utilize IDS/IPS and its relationship to ethical hacking; learn antivirus concepts and implement an AV strategy; configure the firewall in Windows 10 and Windows Server 2019; and learn to configure Windows Defender. Conclude by learning how to implement basic Snort network IDS, a tool that can be used for simple packet capture or for IDS.

WHAT YOU WILL LEARN

  • Discover the key concepts covered in this course
    Describe security devices and how they relate to ethical hacking
    Correctly deploy firewall solutions and describe their relevance to ethical hacking
    Describe the usage of siem and deploy siem systems
    Describe and utilize ids/ips and describe its relation to ethical hacking
  • Describe antivirus concepts and implement an av strategy
    Configure the firewall in windows 10 and windows server 2019
    Configure windows defender
    Implement basic snort ids
    Summarize the key concepts covered in this course

IN THIS COURSE

  • 1m 20s
  • 4m 21s
    After completing this video, you will be able to describe security devices and how they relate to ethical hacking. FREE ACCESS
  • Locked
    3.  Firewall Types and Usage
    6m 18s
    In this video, you will deploy firewall solutions correctly and describe their relevance to ethical hacking. FREE ACCESS
  • Locked
    4.  SIEM Systems
    3m 49s
    Upon completion of this video, you will be able to describe the usage of SIEM and deploy SIEM systems. FREE ACCESS
  • Locked
    5.  Using IDS/IPS
    5m 32s
    Upon completion of this video, you will be able to describe and utilize IDS/IPS and describe its relation to ethical hacking. FREE ACCESS
  • Locked
    6.  Antivirus Strategy
    3m 29s
    Upon completion of this video, you will be able to describe antivirus concepts and implement an antivirus strategy. FREE ACCESS
  • Locked
    7.  Windows Firewall
    5m 31s
    In this video, you will configure the firewall in Windows 10 and Windows Server 2019. FREE ACCESS
  • Locked
    8.  Windows Antivirus
    4m 21s
    In this video, you will learn how to configure Windows Defender. FREE ACCESS
  • Locked
    9.  Implementing Snort
    4m 54s
    In this video, learn how to implement a basic Snort IDS. FREE ACCESS
  • Locked
    10.  Course Summary
    1m 17s

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Rating 4.6 of 80 users Rating 4.6 of 80 users (80)
Rating 4.4 of 200 users Rating 4.4 of 200 users (200)
Rating 4.6 of 1111 users Rating 4.6 of 1111 users (1111)

PEOPLE WHO VIEWED THIS ALSO VIEWED THESE

Rating 4.9 of 9 users Rating 4.9 of 9 users (9)
Rating 4.5 of 441 users Rating 4.5 of 441 users (441)
Rating 4.4 of 14 users Rating 4.4 of 14 users (14)