Ethical Hacking: Network and Perimeter Hacking
Offered By: Pluralsight
Course Description
Overview
This course will teach Network and Perimeter Hacking concepts needed for the Certified Ethical Hacking Exam.
Acquiring the knowledge and skills needed to pass a certification exam is a challenge. In this course, Ethical Hacking: Network and Perimeter Hacking, you’ll learn the network and perimeter hacking concepts needed for the exam objective. First, you’ll explore DoS concepts. Next, you’ll discover the different session hijacking concepts and types. Finally, you’ll identify evading IDS, firewall, and honeypot concepts. When you’re finished with this course, you’ll have the skills and knowledge of network and perimeter hacking needed for the Certified Ethical Hacker exam.
Acquiring the knowledge and skills needed to pass a certification exam is a challenge. In this course, Ethical Hacking: Network and Perimeter Hacking, you’ll learn the network and perimeter hacking concepts needed for the exam objective. First, you’ll explore DoS concepts. Next, you’ll discover the different session hijacking concepts and types. Finally, you’ll identify evading IDS, firewall, and honeypot concepts. When you’re finished with this course, you’ll have the skills and knowledge of network and perimeter hacking needed for the Certified Ethical Hacker exam.
Syllabus
- Course Overview 1min
- Denial of Service 17mins
- Session Hijacking 14mins
- Evading IDS, Firewalls, and Honeypots 25mins
- Course Summary 4mins
Taught by
Michael Teske
Related Courses
Cyberhacker Series: Honeypots, IDS and FW'sUdemy Curso de Introducción a la Seguridad Informática desde Cero!
Udemy Kali Linux Tutorial in Hindi
YouTube Data-Driven Network Security Essentials
LinkedIn Learning Ethical Hacking: Evading IDS, Firewalls, and Honeypots
LinkedIn Learning