Ethical Hacker: Evading IDS, Firewall, & Honeypots Part 2
Ethical Hacker 10
| Intermediate
- 2 Videos | 1h 15m 28s
- Includes Assessment
- Earns a Badge
Discover how to install and configure the Snort intrusion detection software, as you prepare for the 312-50: Certified Ethical Hacker v10 exam. Watch these videos and learn how to identify command line options for SNORT, operate the command to display network interfaces, and execute the command to add an interface to the alert output. From there, you will recall the rule actions available for Snort, identify the IP Protocols available for Snort rules, apply Snort rule header parameters, and select Snort rule options parameters.
WHAT YOU WILL LEARN
-
identify command line options for SNORTidentify the command to add an interface to the alert outputidentify the command to display network interfacesidentify the IP Protocols available for Snort rules
-
identify the rule actions available for Snortidentify the Snort rule header parametersidentify the Snort rule options parameters
IN THIS COURSE
-
1.Evading IDS, Firewall, and Honeypots Part 334m 32s
-
2.Evading IDS, Firewall, and Honeypots Part 440m 57s
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion of this course, which can be shared on any social network or business platform
Digital badges are yours to keep, forever.