Certified Ethical Hacker - CEHv10: Evading IDS, Firewalls, and Honeypots


Overview/Description
Expected Duration
Lesson Objectives
Course Number
Expertise Level



Overview/Description

Explore how to evade intrusion detection systems, firewalls, and honeypots. Examine the use of Nmap to evade firewalls and how to set up a honeypot, as you prepare for the 312-50: Certified Ethical Hacker v10 exam.



Expected Duration (hours)
1.1

Lesson Objectives

Certified Ethical Hacker - CEHv10: Evading IDS, Firewalls, and Honeypots

  • describe IDS alerts when reading IDS statements
  • describe more techniques to gather information regarding an intruder
  • describe NAT devices that help to filter traffic and set security policies
  • describe a method of scanning a specified honeypot with NMAP
  • describe best practices when configuring honeypot
  • describe more methods of scanning honeypots
  • describe the use of several honeypots on a network
  • Course Number:
    it_spceh10tv_21_04_enus

    Expertise Level
    Intermediate