Ethical Hacking: Evading IDS, Firewalls, and Honeypots
Pluralsight
Course Summary
Protect your information from hackers using the most modern methods. This course looks at how security defenses such as intrusion detection systems, firewalls, and honeypots are intended to work and how attackers typically circumvent them.
-
+
Course Description
Most modern networks are protected by a combination of intrusion detection systems and firewalls. Increasingly, they may also include honeypots as a means of early detection of malicious activity. Attackers are constantly looking for ways of evading these defenses in order to render them ineffective. They're seeking to both gain access to resources which are intended to be beyond their reach, and do so in a stealthy manner so as to go undetected. In this course, we'll look at the advantages each of these security defenses provides and the roles they play in securing networks. We'll then look at how attackers seek to undermine their effectiveness by employing a range of techniques that help them evade detection. This course is part of the Ethical Hacking Series. http://blog.pluralsight.com/learning-path-ethical-hacking.
-
+
Course Syllabus
Understanding Organizational Defenses- 25m 4s
—Overview 3m 30s
—Evasion in the Real World 10m 24s
—About IDS, Firewalls, and Honeypots 2m 55s
—Indicators of File System Intrusion 2m 46s
—Indicators of Network Intrusion 2m 32s
—Anomalous Behavior 1m 33s
—Summary 1m 21sFirewalls- 53m 20s
—Overview 2m 39s
—Definition 3m 56s
—Firewall Implementations 3m 40s
—Firewall Architectures 6m 43s
—Packet Filtering Firewalls 3m 38s
—Circuit-level Gateway Firewalls 3m 44s
—Application-level Gateway Firewalls 3m 8s
—Stateful Multilayer Inspection Firewalls 3m 13s
—Identifying the Firewall 5m 8s
—Evasion Techniques 10m 44s
—Evasion Tools 4m 15s
—Summary 2m 26sIntrusion Detection Systems- 57m 52sHoneypots- 44m 25s