Certified Ethical Hacker - CEHv10: Evading IDS, Firewalls, and Honeypots
Overview/Description
Expected Duration
Lesson Objectives
Course Number
Expertise Level
Overview/Description
Explore how to evade intrusion detection systems, firewalls, and honeypots. Examine the use of Nmap to evade firewalls and how to set up a honeypot, as you prepare for the 312-50: Certified Ethical Hacker v10 exam.
Expected Duration (hours)
1.1
Lesson Objectives Certified Ethical Hacker - CEHv10: Evading IDS, Firewalls, and Honeypots
describe IDS alerts when reading IDS statements
describe more techniques to gather information regarding an intruder
describe NAT devices that help to filter traffic and set security policies
describe a method of scanning a specified honeypot with NMAP
describe best practices when configuring honeypot
describe more methods of scanning honeypots
describe the use of several honeypots on a network
Course Number: it_spceh10tv_21_04_enus
Expertise Level
Intermediate