Ethical Hacker: Evading IDS, Firewall, & Honeypots Part 2

Ethical Hacker 10    |    Intermediate
  • 2 Videos | 1h 18m 58s
  • Includes Assessment
  • Earns a Badge
Likes 34 Likes 34
Discover how to install and configure the Snort intrusion detection software, as you prepare for the 312-50: Certified Ethical Hacker v10 exam. Watch these videos and learn how to identify command line options for SNORT, operate the command to display network interfaces, and execute the command to add an interface to the alert output. From there, you will recall the rule actions available for Snort, identify the IP Protocols available for Snort rules, apply Snort rule header parameters, and select Snort rule options parameters.

WHAT YOU WILL LEARN

  • identify command line options for SNORT
    identify the command to add an interface to the alert output
    identify the command to display network interfaces
    identify the IP Protocols available for Snort rules
  • identify the rule actions available for Snort
    identify the Snort rule header parameters
    identify the Snort rule options parameters

IN THIS COURSE

  • Locked
    1. 
    Evading IDS, Firewall, and Honeypots Part 3
    34m 32s
  • Locked
    2. 
    Evading IDS, Firewall, and Honeypots Part 4
    40m 57s

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion of this course, which can be shared on any social network or business platform

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Likes 31 Likes 31  
Likes 28 Likes 28  

PEOPLE WHO VIEWED THIS ALSO VIEWED THESE

Likes 43 Likes 43  
Likes 31 Likes 31  
Likes 287 Likes 287