Information Security: Honeypots

IT Security    |    Beginner
  • 12 videos | 35m 40s
  • Includes Assessment
  • Earns a Badge
Rating 4.5 of 19 users Rating 4.5 of 19 users (19)
Explore various honeypot concepts, such as the types of honeypots, roles and uses of a honeypot, and how honeypot data analysis is used. In this 12-video course, you will examine strengths and weaknesses of a honeypot and how it is placed in networks. Key concepts covered in this course include the honeypot system itself, configured to detect, deflect, or counteract any unauthorized attempt to gain access to information; learning the various types of honeypots that can be used focusing on low and high interaction level types; and learning about the role played by honeypots in overall network security. Next, you will examine learn honeypot uses and disadvantages; learn the deployment strategies of a honeypot; and learn the various open-source and commercial honeypot products available on the market. Finally, learners will observe how honeypots are placed in a network; how to install and configure a honeypot by using KFSensor honeypot software; and explore how honeypot data analysis is captured through automated software or through a manual method.

WHAT YOU WILL LEARN

  • Introduce the key concepts of the course
    Describe a honeypot
    Classify the various types of honeypots that can be used
    Describe the role played by honeypots in overall network security
    List honeypot disadvantages
    Describe honeypot uses
  • Recognize the deployment strategies of a honeypot
    List the various open-source and commercial honeypot products available in the market
    Specify how honeypots are placed in a network
    Install and configure a honeypot using kfsensor honeypot software
    Describe how honeypot data analysis is conducted
    Summarize the key concepts covered in this course

IN THIS COURSE

  • 1m 23s
  • 1m 49s
    Upon completion of this video, you will be able to describe a honeypot. FREE ACCESS
  • Locked
    3.  Types of Honeypots
    6m 23s
    Learn how to classify the various types of honeypots that can be used. FREE ACCESS
  • Locked
    4.  Role of Honeypots in Security
    3m 3s
    After completing this video, you will be able to describe the role played by honeypots in overall network security. FREE ACCESS
  • Locked
    5.  Disadvantages of a Honeypot
    2m 14s
    After completing this video, you will be able to list the disadvantages of honeypots. FREE ACCESS
  • Locked
    6.  Honeypot Uses
    1m 29s
    After completing this video, you will be able to describe the uses of honeypots. FREE ACCESS
  • Locked
    7.  Honeypot Deployment Strategies
    2m 41s
    Upon completion of this video, you will be able to recognize the deployment strategies of a honeypot. FREE ACCESS
  • Locked
    8.  Available Honeypot Products
    36s
    Upon completion of this video, you will be able to list the various open-source and commercial honeypot products available on the market. FREE ACCESS
  • Locked
    9.  Placement of Honeypot in a Network
    6m 6s
    Upon completion of this video, you will be able to specify how honeypots are placed in a network. FREE ACCESS
  • Locked
    10.  Install and Configure a Honeypot
    5m 22s
    Learn how to install and configure a honeypot using the KFSensor honeypot software. FREE ACCESS
  • Locked
    11.  Honeypot Data Analysis
    3m 44s
    Upon completion of this video, you will be able to describe how honeypot data analysis is conducted. FREE ACCESS
  • Locked
    12.  Course Summary
    51s

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Rating 4.6 of 199 users Rating 4.6 of 199 users (199)
Rating 4.4 of 231 users Rating 4.4 of 231 users (231)

PEOPLE WHO VIEWED THIS ALSO VIEWED THESE

Rating 4.7 of 31 users Rating 4.7 of 31 users (31)
Rating 4.3 of 16 users Rating 4.3 of 16 users (16)
Rating 4.2 of 144 users Rating 4.2 of 144 users (144)