CEH v11: Intrusion Prevention and Detection, Firewalls & Honeypots
Ethical Hacker v11 | Intermediate
- 3 Videos | 54m 10s
- Includes Assessment
- Earns a Badge
Intrusion detection and prevention systems are security controls that provide alerts and protection for many organizations today. In this course, you'll explore their function, commonly deployed IDS/IPS solutions, and techniques for evading detection by these systems. Next, you'll examine firewalls, their role as a security countermeasure, and techniques commonly used to bypass them. If you know how an attacker is likely to attack, you can build better defenses to protect your organization. Finally, you'll learn how honeypots can be used to determine the attacks a production network is most likely to face from threats. This course is one in a series that helps to prepare you for the Certified Ethical Hacker v11 (312-50) exam.
WHAT YOU WILL LEARN
describe the techniques that can be used to evade IDS/IPSrecognize the different alert types of deployed IDS/IPS solutionsrecognize the function of intrusion detection and prevention systems (IDS/IPS)describe how firewalls are used as a security countermeasure
describe how firewalls can be configured as a security countermeasuredescribe techniques that are commonly used to bypass firewallsdescribe the types of honeypots that can be used to build better defensesidentify how honeypots can be used to protect your organization
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion of this course, which can be shared on any social network or business platformDigital badges are yours to keep, forever.