CEH v11: Intrusion Prevention and Detection, Firewalls & Honeypots

Ethical Hacker v11    |    Intermediate
  • 3 videos | 54m 10s
  • Includes Assessment
  • Earns a Badge
Rating 4.7 of 29 users Rating 4.7 of 29 users (29)
Intrusion detection and prevention systems are security controls that provide alerts and protection for many organizations today. In this course, you'll explore their function, commonly deployed IDS/IPS solutions, and techniques for evading detection by these systems. Next, you'll examine firewalls, their role as a security countermeasure, and techniques commonly used to bypass them. If you know how an attacker is likely to attack, you can build better defenses to protect your organization. Finally, you'll learn how honeypots can be used to determine the attacks a production network is most likely to face from threats. This course is one in a series that helps to prepare you for the Certified Ethical Hacker v11 (312-50) exam.

WHAT YOU WILL LEARN

  • Recognize the different alert types of deployed ids/ips solutions
    describe the techniques that can be used to evade ids/ips
    recognize the function of intrusion detection and prevention systems (ids/ips)
    Describe techniques that are commonly used to bypass firewalls
  • describe how firewalls are used as a security countermeasure
    describe how firewalls can be configured as a security countermeasure
    Identify how honeypots can be used to protect your organization
    describe the types of honeypots that can be used to build better defenses

IN THIS COURSE

  • Locked
    1.  Intrusion Detection and Prevention Systems
    20m 30s
    Upon completion of this video, you will be able to recognize the function of intrusion detection and prevention systems (IDS/IPS). FREE ACCESS
  • Locked
    2.  Firewalls
    20m 17s
    Upon completion of this video, you will be able to describe how firewalls are used as a security countermeasure. FREE ACCESS
  • Locked
    3.  Honeypots
    13m 23s
    Upon completion of this video, you will be able to describe the types of honeypots that can be used to build better defenses. FREE ACCESS

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Rating 4.7 of 23 users Rating 4.7 of 23 users (23)
Rating 4.1 of 16 users Rating 4.1 of 16 users (16)
Rating 4.6 of 68 users Rating 4.6 of 68 users (68)

PEOPLE WHO VIEWED THIS ALSO VIEWED THESE

Rating 4.6 of 19 users Rating 4.6 of 19 users (19)
Rating 4.7 of 23 users Rating 4.7 of 23 users (23)
Rating 4.4 of 18 users Rating 4.4 of 18 users (18)