Information Security: Honeypots
IT Security
| Beginner
- 12 videos | 35m 40s
- Includes Assessment
- Earns a Badge
Explore various honeypot concepts, such as the types of honeypots, roles and uses of a honeypot, and how honeypot data analysis is used. In this 12-video course, you will examine strengths and weaknesses of a honeypot and how it is placed in networks. Key concepts covered in this course include the honeypot system itself, configured to detect, deflect, or counteract any unauthorized attempt to gain access to information; learning the various types of honeypots that can be used focusing on low and high interaction level types; and learning about the role played by honeypots in overall network security. Next, you will examine learn honeypot uses and disadvantages; learn the deployment strategies of a honeypot; and learn the various open-source and commercial honeypot products available on the market. Finally, learners will observe how honeypots are placed in a network; how to install and configure a honeypot by using KFSensor honeypot software; and explore how honeypot data analysis is captured through automated software or through a manual method.
WHAT YOU WILL LEARN
-
Introduce the key concepts of the courseDescribe a honeypotClassify the various types of honeypots that can be usedDescribe the role played by honeypots in overall network securityList honeypot disadvantagesDescribe honeypot uses
-
Recognize the deployment strategies of a honeypotList the various open-source and commercial honeypot products available in the marketSpecify how honeypots are placed in a networkInstall and configure a honeypot using kfsensor honeypot softwareDescribe how honeypot data analysis is conductedSummarize the key concepts covered in this course
IN THIS COURSE
-
1m 23s
-
1m 49sUpon completion of this video, you will be able to describe a honeypot. FREE ACCESS
-
6m 23sLearn how to classify the various types of honeypots that can be used. FREE ACCESS
-
3m 3sAfter completing this video, you will be able to describe the role played by honeypots in overall network security. FREE ACCESS
-
2m 14sAfter completing this video, you will be able to list the disadvantages of honeypots. FREE ACCESS
-
1m 29sAfter completing this video, you will be able to describe the uses of honeypots. FREE ACCESS
-
2m 41sUpon completion of this video, you will be able to recognize the deployment strategies of a honeypot. FREE ACCESS
-
36sUpon completion of this video, you will be able to list the various open-source and commercial honeypot products available on the market. FREE ACCESS
-
6m 6sUpon completion of this video, you will be able to specify how honeypots are placed in a network. FREE ACCESS
-
5m 22sLearn how to install and configure a honeypot using the KFSensor honeypot software. FREE ACCESS
-
3m 44sUpon completion of this video, you will be able to describe how honeypot data analysis is conducted. FREE ACCESS
-
51s
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.
Digital badges are yours to keep, forever.