Ethical Hacker: Evading IDS, Firewall, & Honeypots Part 2

Ethical Hacker 10
  • 2 Videos | 1h 15m 28s
  • Includes Assessment
  • Earns a Badge
Likes 24 Likes 24
Discover how to install and configure the Snort intrusion detection software, as you prepare for the 312-50: Certified Ethical Hacker v10 exam. Watch these videos and learn how to identify command line options for SNORT, operate the command to display network interfaces, and execute the command to add an interface to the alert output. From there, you will recall the rule actions available for Snort, identify the IP Protocols available for Snort rules, apply Snort rule header parameters, and select Snort rule options parameters.

WHAT YOU WILL LEARN

  • identify command line options for SNORT
    identify the command to add an interface to the alert output
    identify the command to display network interfaces
    identify the IP Protocols available for Snort rules
  • identify the rule actions available for Snort
    identify the Snort rule header parameters
    identify the Snort rule options parameters

IN THIS COURSE

  • Locked
    1. 
    Evading IDS, Firewall, and Honeypots Part 3
    34m 32s
  • Locked
    2. 
    Evading IDS, Firewall, and Honeypots Part 4
    40m 57s

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion of this course, which can be shared on any social network or business platform

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Likes 31 Likes 31  
Likes 17 Likes 17  
Likes 20 Likes 20  

PEOPLE WHO VIEWED THIS ALSO VIEWED THESE

Likes 23 Likes 23  
Likes 287 Likes 287  
Likes 50 Likes 50