CEH v11: Intrusion Prevention and Detection, Firewalls & Honeypots

Ethical Hacker v11    |    Intermediate
  • 3 Videos | 54m 10s
  • Includes Assessment
  • Earns a Badge
Intrusion detection and prevention systems are security controls that provide alerts and protection for many organizations today. In this course, you'll explore their function, commonly deployed IDS/IPS solutions, and techniques for evading detection by these systems. Next, you'll examine firewalls, their role as a security countermeasure, and techniques commonly used to bypass them. If you know how an attacker is likely to attack, you can build better defenses to protect your organization. Finally, you'll learn how honeypots can be used to determine the attacks a production network is most likely to face from threats. This course is one in a series that helps to prepare you for the Certified Ethical Hacker v11 (312-50) exam.

WHAT YOU WILL LEARN

  • describe the techniques that can be used to evade IDS/IPS
    recognize the different alert types of deployed IDS/IPS solutions
    recognize the function of intrusion detection and prevention systems (IDS/IPS)
    describe how firewalls are used as a security countermeasure
  • describe how firewalls can be configured as a security countermeasure
    describe techniques that are commonly used to bypass firewalls
    describe the types of honeypots that can be used to build better defenses
    identify how honeypots can be used to protect your organization

IN THIS COURSE

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion of this course, which can be shared on any social network or business platform

Digital badges are yours to keep, forever.