YoVDO

Ethical Hacking: Evading IDS, Firewalls, and Honeypots

Offered By: LinkedIn Learning

Tags

Ethical Hacking Courses Cybersecurity Courses GNS3 (Graphical Network Simulator) Courses Firewalls Courses Web Application Firewalls Courses Honeypots Courses

Course Description

Overview

Take your first steps into testing client defenses. Learn about firewalls, network simulation using GNS3, special-purpose perimeter devices, and intrusion response techniques.

Syllabus

Introduction
  • Finding weaknesses in the perimeter
  • What you should know
  • Course disclaimer
1. Firewalls
  • Understanding Firewalls
  • Apply the basics of the Windows firewall
  • Use advanced features in the Windows Firewall
  • Review firewall logs
  • Understand Linux IPTables
  • Set up an IPTables firewall
  • Manage rules with Firewall Builder
  • Port testing
2. Hardware Firewalls
  • Set up a Cisco PIX firewall
  • Create a secure enclave
3. Network Simulation Using GNS3
  • Install GNS3
  • Obtain network device images
  • Set up a network
  • Simulate the ASA firewall
  • Integrate Kali into GNS3
4. Special Purpose Perimeter Devices
  • Understand Web Application Firewalls
  • Protect API services with the WSO2 gateway
  • Understand honeypots
  • Run the Cowrie honeypot
5. Protection from Intrusion
  • Intrusion response techniques
  • xListing sites
  • Snort rules
  • Detect intrusions with Security Onion
  • Extend IDS with reputation
  • EINSTEIN
6. Evasion Techniques
  • Evading antivirus detection
  • Obfuscating payloads with msfvenom
  • Hiding payloads in benign files
  • Custom packaging of software
  • Fileless attacks with PowerShell
  • Hiding with the cloak of invisibility
  • Embedding malware in an alternate data stream
  • Checking for oversight
Conclusion
  • Next steps

Taught by

Malcolm Shore

Related Courses

Detecting and Mitigating Cyber Threats and Attacks
University of Colorado System via Coursera
Secure Networked System with Firewall and IDS
University of Colorado System via Coursera
Networking in Google Cloud: Fundamentals
Google Cloud via Coursera
Introduction to Cybersecurity for Teachers
Raspberry Pi Foundation via FutureLearn
Introduction to Cybersecurity Tools & Cyberattacks
IBM via Coursera