Ethical Hacking: Evading IDS, Firewalls, and Honeypots
Offered By: LinkedIn Learning
Course Description
Overview
Take your first steps into testing client defenses. Learn about firewalls, network simulation using GNS3, special-purpose perimeter devices, and intrusion response techniques.
Syllabus
Introduction
- Finding weaknesses in the perimeter
- What you should know
- Course disclaimer
- Understanding Firewalls
- Apply the basics of the Windows firewall
- Use advanced features in the Windows Firewall
- Review firewall logs
- Understand Linux IPTables
- Set up an IPTables firewall
- Manage rules with Firewall Builder
- Port testing
- Set up a Cisco PIX firewall
- Create a secure enclave
- Install GNS3
- Obtain network device images
- Set up a network
- Simulate the ASA firewall
- Integrate Kali into GNS3
- Understand Web Application Firewalls
- Protect API services with the WSO2 gateway
- Understand honeypots
- Run the Cowrie honeypot
- Intrusion response techniques
- xListing sites
- Snort rules
- Detect intrusions with Security Onion
- Extend IDS with reputation
- EINSTEIN
- Evading antivirus detection
- Obfuscating payloads with msfvenom
- Hiding payloads in benign files
- Custom packaging of software
- Fileless attacks with PowerShell
- Hiding with the cloak of invisibility
- Embedding malware in an alternate data stream
- Checking for oversight
- Next steps
Taught by
Malcolm Shore
Related Courses
AWS SimuLearn: Intelligent Application ProtectionAmazon Web Services via AWS Skill Builder CISO Security Controls: Enterprise Controls
Cybrary Fortinet FortiWeb Cloud WAF-as-a-Service
Cybrary Filtering and blocking web incursions with AWS WAF (Traditional Chinese)
Amazon Web Services via AWS Skill Builder AWS Administration: Security Fundamentals
LinkedIn Learning