Ethical Hacker: Evading IDS, Firewall, & Honeypots

Ethical Hacker 10
  • 2 Videos | 1h 8m 45s
  • Includes Assessment
  • Earns a Badge
Likes 28 Likes 28
Explore how to evade intrusion detection systems, firewalls, and honeypots. Examine the use of Nmap to evade firewalls and how to set up a honeypot, as you prepare for the 312-50: Certified Ethical Hacker v10 exam.

WHAT YOU WILL LEARN

  • describe IDS alerts when reading IDS statements
    describe more techniques to gather information regarding an intruder
    describe NAT devices that help to filter traffic and set security policies
    describe a method of scanning a specified honeypot with NMAP
  • describe best practices when configuring honeypot
    describe more methods of scanning honeypots
    describe the use of several honeypots on a network

IN THIS COURSE

  • Locked
    1. 
    Evading IDS, Firewall, and Honeypots
    32m 51s
  • Locked
    2. 
    Evading IDS, Firewall, and Honeypots Part 2
    35m 55s

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion of this course, which can be shared on any social network or business platform

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Likes 28 Likes 28  
Likes 52 Likes 52  
Likes 168 Likes 168  

PEOPLE WHO VIEWED THIS ALSO VIEWED THESE

Likes 287 Likes 287  
Likes 168 Likes 168