Ethical Hacking: Evading IDS, Firewalls, and Honeypots
Pluralsight is not an official partner or accredited training center of EC-Council. This course looks at how security defenses such as intrusion detection systems, firewalls, and more are intended to work and how attackers typically circumvent them.
Pluralsight is not an official partner or accredited training center of EC-Council. Most modern networks are protected by a combination of intrusion detection systems and firewalls. Increasingly, they may also include honeypots as a means of early detection of malicious activity. Attackers are constantly looking for ways of evading these defenses in order to render them ineffective. They’re seeking to both gain access to resources which are intended to be beyond their reach, and do so in a stealthy manner so as to go undetected. In this course, we’ll look at the advantages each of these security defenses provides and the roles they play in securing networks. We’ll then look at how attackers seek to undermine their effectiveness by employing a range of techniques that help them evade detection. This course is part of the Ethical Hacking Series. http://blog.pluralsight.com/learning-path-ethical-hacking.
Author Name: Troy Hunt
Author Description:
Troy Hunt is a Microsoft Regional Director and MVP for Developer Security, an ASPInsider, and a full time Author for Pluralsight—a leader in online training for technology and creative professionals. Troy has been building software for browsers since the very early days of the web and possesses an exceptional ability to distill complex subjects into relatable explanations. This has led Troy to become an industry thought leader in the security space and produce more than twenty top-rated courses … more
There are no reviews yet.