Ethical Hacking: Evading IDS, Firewalls, and Honeypots

  • Keyboard Shortcuts




Ethical hacking-testing to see if an organization’s network is susceptible to outside attacks-will be a preferred skill for most IT security specialists. In this program, cybersecurity specialist Malcolm Shore prepares one to take your very first steps into testing customer defenses. Malcolm gives you a synopsis of firewall technology, detailing how firewalls function in both Linux and Home windows, as properly as how to create a firewall simulation in a GNS3 system. Next, he explains web program firewalls, API gateway risk mitigation options, and how to make use of honeypots to identify intruders. Finally, he addresses the main methods to manage a suspected intrusion, including how exactly to use the Protection Onion intrusion detection program (IDS).

Take note: The topics covered within this course are usually drawn from the Evading IDS, Firewalls, and Honeypots competency within the Certified Ethical Hacker (CEH) body of information.

Topics include:
  • Applying the fundamentals of the Home windows Firewall
  • Using advanced functions in the Home windows Firewall
  • Reviewing firewall logs
  • Linux iptables
  • Setting up a good iptables firewall
  • Managing rules along with Firewall Builder
  • Setting up the Cisco PIX firewall
  • Installing GNS3
  • How web application firewalls protect web servers
  • Protecting API providers with the WSO2 gateway
  • Running the particular Cowrie honeypot
  • Detecting intrusions with Safety Onion

Skill Level Intermediate

2h 19m




Show A lot more Display Less

Continue Assessment

You started this assessment previously and didn’t complete it. It is possible to grab where you still left off, or begin over.

Start Over

Apply for this course: CLick here