YoVDO

Ethical Hacking: Evading IDS, Firewalls, and Honeypots

Offered By: Pluralsight

Tags

Ethical Hacking Courses Cybersecurity Courses Network Security Courses Firewalls Courses Intrusion Detection Systems Courses Honeypots Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Pluralsight is not an official partner or accredited training center of
EC-Council. This course looks at how security defenses such as intrusion detection systems, firewalls, and more are intended to work and how attackers typically circumvent them.

Pluralsight is not an official partner or accredited training center of EC-Council. Most modern networks are protected by a combination of intrusion detection systems and firewalls. Increasingly, they may also include honeypots as a means of early detection of malicious activity. Attackers are constantly looking for ways of evading these defenses in order to render them ineffective. They're seeking to both gain access to resources which are intended to be beyond their reach, and do so in a stealthy manner so as to go undetected. In this course, we'll look at the advantages each of these security defenses provides and the roles they play in securing networks. We'll then look at how attackers seek to undermine their effectiveness by employing a range of techniques that help them evade detection. This course is part of the Ethical Hacking Series. http://blog.pluralsight.com/learning-path-ethical-hacking.

Syllabus

  • Understanding Organizational Defenses 25mins
  • Firewalls 53mins
  • Intrusion Detection Systems 57mins
  • Honeypots 44mins

Taught by

Troy Hunt

Related Courses

Detecting and Mitigating Cyber Threats and Attacks
University of Colorado System via Coursera
Secure Networked System with Firewall and IDS
University of Colorado System via Coursera
Networking in Google Cloud: Fundamentals
Google Cloud via Coursera
Introduction to Cybersecurity for Teachers
Raspberry Pi Foundation via FutureLearn
Introduction to Cybersecurity Tools & Cyberattacks
IBM via Coursera