CEH v11: Intrusion Prevention and Detection, Firewalls & Honeypots
Ethical Hacker v11 | Intermediate
- 3 Videos | 54m 10s
- Includes Assessment
- Earns a Badge
Intrusion detection and prevention systems are security controls that provide alerts and protection for many organizations today. In this course, you'll explore their function, commonly deployed IDS/IPS solutions, and techniques for evading detection by these systems. Next, you'll examine firewalls, their role as a security countermeasure, and techniques commonly used to bypass them. If you know how an attacker is likely to attack, you can build better defenses to protect your organization. Finally, you'll learn how honeypots can be used to determine the attacks a production network is most likely to face from threats. This course is one in a series that helps to prepare you for the Certified Ethical Hacker v11 (312-50) exam.
WHAT YOU WILL LEARN
recognize the different alert types of deployed IDS/IPS solutionsdescribe the techniques that can be used to evade IDS/IPSrecognize the function of intrusion detection and prevention systems (IDS/IPS)describe techniques that are commonly used to bypass firewalls
describe how firewalls are used as a security countermeasuredescribe how firewalls can be configured as a security countermeasureidentify how honeypots can be used to protect your organizationdescribe the types of honeypots that can be used to build better defenses
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion of this course, which can be shared on any social network or business platformDigital badges are yours to keep, forever.