Companies Home Search Profile

Ethical Hacking: Evading IDS, Firewalls, and Honeypots

Focused View

Malcolm Shore

2:19:56

0 View
  • 01 Finding weaknesses in the perimeter.mp4
    01:07
  • 02 What you should know.mp4
    00:43
  • 03 Course disclaimer.mp4
    01:10
  • 04 Understanding Firewalls.mp4
    01:02
  • 05 Apply the basics of the Windows firewall.mp4
    05:17
  • 06 Use advanced features in the Windows Firewall.mp4
    08:18
  • 07 Review firewall logs.mp4
    03:22
  • 08 Understand Linux IPTables.mp4
    04:14
  • 09 Set up an IPTables firewall.mp4
    02:52
  • 10 Manage rules with Firewall Builder.mp4
    08:24
  • 11 Port testing.mp4
    01:07
  • 12 Set up a Cisco PIX firewall.mp4
    03:15
  • 13 Create a secure enclave.mp4
    03:42
  • 14 Set up a Cisco PIX firewall.mp4
    03:15
  • 15 Create a secure enclave.mp4
    03:42
  • 16 Install GNS3.mp4
    06:33
  • 17 Obtain network device images.mp4
    02:24
  • 18 Set up a network.mp4
    04:35
  • 19 Simulate the ASA firewall.mp4
    06:38
  • 20 Integrate Kali into GNS3.mp4
    04:46
  • 21 Understand Web Application Firewalls.mp4
    03:50
  • 22 Protect API services with the WSO2 gateway.mp4
    09:24
  • 23 Understand honeypots.mp4
    04:02
  • 24 Run the Cowrie honeypot.mp4
    01:58
  • 25 Intrusion response techniques.mp4
    04:54
  • 26 xListing sites.mp4
    01:02
  • 27 Snort rules.mp4
    05:28
  • 28 Detect intrusions with Security Onion.mp4
    05:46
  • 29 Extend IDS with reputation.mp4
    02:35
  • 30 EINSTEIN.mp4
    02:42
  • 31 Evading antivirus detection.mp4
    01:24
  • 32 Obfuscating payloads with msfvenom.mp4
    02:09
  • 33 Hiding payloads in benign files.mp4
    04:34
  • 34 Custom packaging of software.mp4
    01:02
  • 35 Fileless attacks with PowerShell.mp4
    04:38
  • 36 Hiding with the cloak of invisibility.mp4
    01:42
  • 37 Embedding malware in an alternate data stream.mp4
    04:06
  • 38 Checking for oversight.mp4
    01:21
  • 39 Next steps.mp4
    00:53
  • Ex Files Ethical Firewalls Honeypots Upd.zip
  • Description


    Ethical hacking—testing to see if an organization's network is vulnerable to outside attacks—is a desired skill for many IT security professionals. In this course, cybersecurity expert Malcolm Shore prepares you to take your first steps into testing client defenses. Malcolm provides you with an overview of firewall technology, detailing how firewalls work in both Windows and Linux, as well as how to set up a firewall simulation in a GNS3 network. Next, he goes over web application firewalls, API gateway threat mitigation solutions, and how to use honeypots to detect intruders. Malcolm also explains evasion techniques like exotic scanning and tunneling through DNS. Finally, he covers the main ways to manage a suspected intrusion, including how to use the Security Onion intrusion detection system (IDS).

    Note: The topics covered in this course are drawn from the Evading IDS, Firewalls, and Honeypots competency in the Certified Ethical Hacker (CEH) body of knowledge.

    More details


    User Reviews
    Rating
    0
    0
    0
    0
    0
    average 0
    Total votes0
    Focused display
    Malcolm Shore
    Malcolm Shore
    Instructor's Courses
    Wide range of IT experience ranging from systems programming to policy and strategic planning. Strong expertise in applied IT security, focused on policy and governance. Teaching post graduate security (forensics, information warfare, security management, applied cryptography) Past interests include virtual worlds and web3d developments. Current work focusing on Cloud, security architectures, and national-level cybersecurity Specialties: SABSA, Cloud, Cryptography, Cybersecurity Strategy, Network Survivability
    LinkedIn Learning is an American online learning provider. It provides video courses taught by industry experts in software, creative, and business skills. It is a subsidiary of LinkedIn. All the courses on LinkedIn fall into four categories: Business, Creative, Technology and Certifications. It was founded in 1995 by Lynda Weinman as Lynda.com before being acquired by LinkedIn in 2015. Microsoft acquired LinkedIn in December 2016.
    • language english
    • Training sessions 39
    • duration 2:19:56
    • English subtitles has
    • Release Date 2024/09/22