Ethical Hacking: Evading IDS, Firewalls, and Honeypots
Offered By: LinkedIn Learning
Course Description
Overview
Take your first steps into testing client defenses. Learn about firewalls, network simulation using GNS3, special-purpose perimeter devices, and intrusion response techniques.
Syllabus
Introduction
- Finding weaknesses in the perimeter
- What you should know
- Course disclaimer
- Understanding Firewalls
- Apply the basics of the Windows firewall
- Use advanced features in the Windows Firewall
- Review firewall logs
- Understand Linux IPTables
- Set up an IPTables firewall
- Manage rules with Firewall Builder
- Port testing
- Set up a Cisco PIX firewall
- Create a secure enclave
- Install GNS3
- Obtain network device images
- Set up a network
- Simulate the ASA firewall
- Integrate Kali into GNS3
- Understand Web Application Firewalls
- Protect API services with the WSO2 gateway
- Understand honeypots
- Run the Cowrie honeypot
- Intrusion response techniques
- xListing sites
- Snort rules
- Detect intrusions with Security Onion
- Extend IDS with reputation
- EINSTEIN
- Evading antivirus detection
- Exotic scanning with Nmap
- Obfuscating payloads with msfvenom
- Hiding payloads in benign files
- Custom packaging of software
- Fileless attacks with PowerShell
- Hiding with the cloak of invisibility
- Embedding malware in an alternate data stream
- Tunneling through DNS with iodine
- Checking for oversight
- Next steps
Taught by
Malcolm Shore
Related Courses
Certified Ethical Hacker (CEH) - Linux Academy's Prep CourseA Cloud Guru Advanced Python Scripting for Cybersecurity
Infosec via Coursera Introduction to IT Security
Akamai via Coursera Cyber Comp 1A
Cabrillo College via California Community Colleges System Ethical Hacking
Cabrillo College via California Community Colleges System