Information Security: Honeypots

IT Security    |    Beginner
  • 12 Videos | 40m 40s
  • Includes Assessment
  • Earns a Badge
Likes 10 Likes 10
Explore various honeypot concepts, such as the types of honeypots, roles and uses of a honeypot, and how honeypot data analysis is used. In this 12-video course, you will examine strengths and weaknesses of a honeypot and how it is placed in networks. Key concepts covered in this course include the honeypot system itself, configured to detect, deflect, or counteract any unauthorized attempt to gain access to information; learning the various types of honeypots that can be used focusing on low and high interaction level types; and learning about the role played by honeypots in overall network security. Next, you will examine learn honeypot uses and disadvantages; learn the deployment strategies of a honeypot; and learn the various open-source and commercial honeypot products available on the market. Finally, learners will observe how honeypots are placed in a network; how to install and configure a honeypot by using KFSensor honeypot software; and explore how honeypot data analysis is captured through automated software or through a manual method.

WHAT YOU WILL LEARN

  • introduce the key concepts of the course
    describe a honeypot
    classify the various types of honeypots that can be used
    describe the role played by honeypots in overall network security
    list honeypot disadvantages
    describe honeypot uses
  • recognize the deployment strategies of a honeypot
    list the various open-source and commercial honeypot products available in the market
    specify how honeypots are placed in a network
    install and configure a honeypot using KFSensor honeypot software
    describe how honeypot data analysis is conducted
    summarize the key concepts covered in this course

IN THIS COURSE

  • Playable
    1. 
    Course Overview
    1m 23s
    UP NEXT
  • Playable
    2. 
    Honeypot Introduction
    1m 49s
  • Locked
    3. 
    Types of Honeypots
    6m 23s
  • Locked
    4. 
    Role of Honeypots in Security
    3m 3s
  • Locked
    5. 
    Disadvantages of a Honeypot
    2m 14s
  • Locked
    6. 
    Honeypot Uses
    1m 29s
  • Locked
    7. 
    Honeypot Deployment Strategies
    2m 41s
  • Locked
    8. 
    Available Honeypot Products
    36s
  • Locked
    9. 
    Placement of Honeypot in a Network
    6m 6s
  • Locked
    10. 
    Install and Configure a Honeypot
    5m 22s
  • Locked
    11. 
    Honeypot Data Analysis
    3m 44s
  • Locked
    12. 
    Course Summary
    51s

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion of this course, which can be shared on any social network or business platform

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Likes 17 Likes 17  
Likes 35 Likes 35