Ethical Hacking: Evading IDS, Firewalls, and Honeypots
Offered By: LinkedIn Learning
Course Description
Overview
Take your first steps into testing client defenses. Learn about firewalls, network simulation using GNS3, special-purpose perimeter devices, and intrusion response techniques.
Syllabus
Introduction
- Finding weaknesses in the perimeter
- What you should know
- Course disclaimer
- Understanding Firewalls
- Apply the basics of the Windows firewall
- Use advanced features in the Windows Firewall
- Review firewall logs
- Understand Linux IPTables
- Set up an IPTables firewall
- Manage rules with Firewall Builder
- Port testing
- Set up a Cisco PIX firewall
- Create a secure enclave
- Install GNS3
- Obtain network device images
- Set up a network
- Simulate the ASA firewall
- Integrate Kali into GNS3
- Understand Web Application Firewalls
- Protect API services with the WSO2 gateway
- Understand honeypots
- Run the Cowrie honeypot
- Intrusion response techniques
- xListing sites
- Snort rules
- Detect intrusions with Security Onion
- Extend IDS with reputation
- EINSTEIN
- Evading antivirus detection
- Obfuscating payloads with msfvenom
- Hiding payloads in benign files
- Custom packaging of software
- Fileless attacks with PowerShell
- Hiding with the cloak of invisibility
- Embedding malware in an alternate data stream
- Checking for oversight
- Next steps
Taught by
Malcolm Shore
Related Courses
Computer SecurityStanford University via Coursera Cryptography II
Stanford University via Coursera Malicious Software and its Underground Economy: Two Sides to Every Story
University of London International Programmes via Coursera Building an Information Risk Management Toolkit
University of Washington via Coursera Introduction to Cybersecurity
National Cybersecurity Institute at Excelsior College via Canvas Network