Published on: 2024-09-02 21:36:18
Categories: 28
Share:
Ethical Hacking Course: Evading IDS, Firewalls, and Honeypots. Ethical hacking, testing to determine the vulnerability of an organization’s network to external attacks, is a required skill for many IT security professionals. In this course, cybersecurity expert Malcolm Shore prepares you to take your first steps in testing your client’s defenses. Malcolm gives you an overview of firewall technology, detailing how firewalls work on Windows and Linux, as well as how to set up a firewall emulation on a GNS3 network. Then, he covers web application firewalls, API gateway threat mitigation solutions, and how to use a honeypot to detect intruders. Malcolm also explains evasion techniques such as strange scanning and tunneling through DNS. Finally, he covers the main methods of managing a suspected intrusion, including how to use Security Onion’s intrusion detection system (IDS).
After Extract, view with your favorite Player.
Subtitle: English
Quality: 720p
File(s) password: www.downloadly.ir
339 MB
Sharing is caring: