Ethical Hacking: Network and Perimeter Hacking
This course will teach Network and Perimeter Hacking concepts needed for the Certified Ethical Hacking Exam.
Acquiring the knowledge and skills needed to pass a certification exam is a challenge. In this course, Ethical Hacking: Network and Perimeter Hacking, you’ll learn the network and perimeter hacking concepts needed for the exam objective. First, you’ll explore DoS concepts. Next, you’ll discover the different session hijacking concepts and types. Finally, you’ll identify evading IDS, firewall, and honeypot concepts. When you’re finished with this course, you’ll have the skills and knowledge of network and perimeter hacking needed for the Certified Ethical Hacker exam.
Author Name: Michael Teske
Author Description:
Michael Teske is a principal security author with Pluralsight helping people build their skills toolkit. Michael has 25+ years of experience in the IT Ops/Cloud/Cybersecurity industry including 17 of those years as an IT instructor at a technical college, focusing on Microsoft server infrastructure, security and automation. Michael attained his MBA with an emphasis in Computer Information System Security several years ago. Michael still keeps up with the industry as an independent consultant in … more
Table of Contents
- Course Overview
1min - Denial of Service
17mins - Session Hijacking
14mins - Evading IDS, Firewalls, and Honeypots
25mins - Course Summary
4mins
There are no reviews yet.