Ethical Hacker: Evading IDS, Firewall, & Honeypots
Ethical Hacker 10 | Intermediate
- 2 Videos | 1h 8m 45s
- Includes Assessment
- Earns a Badge
Explore how to evade intrusion detection systems, firewalls, and honeypots, as you prepare for the 312-50: Certified Ethical Hacker v10 exam. Watch these videos and learn how to interpret IDS alerts from IDS statements, specify NAT devices that filter traffic and set security policies, and recall more techniques to gather information about an intruder. From there, you will learn how to recite best practices to configure a honeypot, explain the use of several honeypots on a network, describe a method to scan a specified honeypot with NMAP, and list more methods to scan honeypots.
WHAT YOU WILL LEARN
describe IDS alerts when reading IDS statementsdescribe more techniques to gather information regarding an intruderdescribe NAT devices that help to filter traffic and set security policiesdescribe a method of scanning a specified honeypot with NMAP
describe best practices when configuring honeypotdescribe more methods of scanning honeypotsdescribe the use of several honeypots on a network
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion of this course, which can be shared on any social network or business platformDigital badges are yours to keep, forever.
YOU MIGHT ALSO LIKE
COURSE Ethical Hacker: Scanning
PEOPLE WHO VIEWED THIS ALSO VIEWED THESE