Firewalls and Intrusion Detection
Offered By: Pluralsight
Course Description
Overview
Pluralsight is not an official partner or accredited training center of EC-Council. This course will cover what you need to know about security solutions from concepts to implementation.
Pluralsight is not an official partner or accredited training center of EC-Council. Malicious users and software continuously scan networks looking for vulnerable devices and hosts. In this course, Firewalls and Intrusion Detection, you'll acquire the ability to determine how various types of firewalls should be deployed in your specific environment. First, you'll discover how to implement an intrusion detection system to detect suspicious activity. Next, you'll learn how to determine between honeypots and honeynets. Finally, you'll explore how honeynets and honeypots can be used as IT system decoys to track intruder actions in order to learn how production systems should be hardened. When you have completed this course, you will have the skills to implement various types of firewalls for specific environments.
Pluralsight is not an official partner or accredited training center of EC-Council. Malicious users and software continuously scan networks looking for vulnerable devices and hosts. In this course, Firewalls and Intrusion Detection, you'll acquire the ability to determine how various types of firewalls should be deployed in your specific environment. First, you'll discover how to implement an intrusion detection system to detect suspicious activity. Next, you'll learn how to determine between honeypots and honeynets. Finally, you'll explore how honeynets and honeypots can be used as IT system decoys to track intruder actions in order to learn how production systems should be hardened. When you have completed this course, you will have the skills to implement various types of firewalls for specific environments.
Syllabus
- Course Overview 1min
- Firewall Concepts 48mins
- IDS and IPS 34mins
- Honeypots 18mins
Taught by
Daniel Lachance
Related Courses
Cyberhacker Series: Honeypots, IDS and FW'sUdemy Curso de Introducción a la Seguridad Informática desde Cero!
Udemy Kali Linux Tutorial in Hindi
YouTube Data-Driven Network Security Essentials
LinkedIn Learning Ethical Hacking: Evading IDS, Firewalls, and Honeypots
LinkedIn Learning