Ethical Hacking: Evading IDS, Firewalls, and Honeypots
Offered By: LinkedIn Learning
Course Description
Overview
Take your first steps into testing client defenses. Learn about firewalls, network simulation using GNS3, special-purpose perimeter devices, and intrusion response techniques.
Syllabus
Introduction
- Finding weaknesses in the perimeter
- What you should know
- Course disclaimer
- Understanding Firewalls
- Apply the basics of the Windows firewall
- Use advanced features in the Windows Firewall
- Review firewall logs
- Understand Linux IPTables
- Set up an IPTables firewall
- Manage rules with Firewall Builder
- Port testing
- Set up a Cisco PIX firewall
- Create a secure enclave
- Install GNS3
- Obtain network device images
- Set up a network
- Simulate the ASA firewall
- Integrate Kali into GNS3
- Understand Web Application Firewalls
- Protect API services with the WSO2 gateway
- Understand honeypots
- Run the Cowrie honeypot
- Intrusion response techniques
- xListing sites
- Snort rules
- Detect intrusions with Security Onion
- Extend IDS with reputation
- EINSTEIN
- Evading antivirus detection
- Exotic scanning with Nmap
- Obfuscating payloads with msfvenom
- Hiding payloads in benign files
- Custom packaging of software
- Fileless attacks with PowerShell
- Hiding with the cloak of invisibility
- Embedding malware in an alternate data stream
- Tunneling through DNS with iodine
- Checking for oversight
- Next steps
Taught by
Malcolm Shore
Related Courses
Advanced Python Scripting for CybersecurityInfosec via Coursera Python for Command-and-control, Exfiltration and Impact
Infosec via Coursera Fundamentos del Internet de las cosas (IoT): Seguridad I
Galileo University via edX MSc Cyber Security
Coventry University via FutureLearn Cyber Incident Response
Infosec via Coursera