Ethical Hacker: Evading IDS, Firewall, & Honeypots
Ethical Hacker 10 | Intermediate
- 2 videos | 1h 8m 45s
- Includes Assessment
- Earns a Badge
Explore how to evade intrusion detection systems, firewalls, and honeypots, as you prepare for the 312-50: Certified Ethical Hacker v10 exam. Watch these videos and learn how to interpret IDS alerts from IDS statements, specify NAT devices that filter traffic and set security policies, and recall more techniques to gather information about an intruder. From there, you will learn how to recite best practices to configure a honeypot, explain the use of several honeypots on a network, describe a method to scan a specified honeypot with NMAP, and list more methods to scan honeypots.
WHAT YOU WILL LEARN
Describe nat devices that help to filter traffic and set security policiesdescribe ids alerts when reading ids statementsdescribe more techniques to gather information regarding an intruderDescribe best practices when configuring honeypot
describe a method of scanning a specified honeypot with nmapdescribe the use of several honeypots on a networkdescribe more methods of scanning honeypots
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.Digital badges are yours to keep, forever.
YOU MIGHT ALSO LIKE
Rating 4.6 of 199 users (199)
Rating 4.6 of 343 users (343)