Ethical Hacker: Evading IDS, Firewall, & Honeypots
Ethical Hacker 10
2 Videos | 1h 8m 45s
- Includes Assessment
- Earns a Badge
Explore how to evade intrusion detection systems, firewalls, and honeypots. Examine the use of Nmap to evade firewalls and how to set up a honeypot, as you prepare for the 312-50: Certified Ethical Hacker v10 exam.
WHAT YOU WILL LEARN
describe IDS alerts when reading IDS statementsdescribe more techniques to gather information regarding an intruderdescribe NAT devices that help to filter traffic and set security policiesdescribe a method of scanning a specified honeypot with NMAP
describe best practices when configuring honeypotdescribe more methods of scanning honeypotsdescribe the use of several honeypots on a network
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion of this course, which can be shared on any social network or business platformDigital badges are yours to keep, forever.
YOU MIGHT ALSO LIKE
PEOPLE WHO VIEWED THIS ALSO VIEWED THESE