Deterring Electronic Intrusions


Overview/Description
Target Audience
Prerequisites
Expected Duration
Lesson Objectives
Course Number



Overview/Description
Securing electronic access to an environment forms the backbone of IT security professionals' jobs. IT security specialists deal with methods to secure network access, both internally and externally. This course examines firewall, intrusion detection system (IDS), and honeypot detection techniques, as well as evasion techniques that can be used by an ethical hacker to determine whether a network is secure from hackers. This course also assists students who are preparing for the EC Council's Ethical Hacking and Countermeasures (CEHv6) exam 312-50.

Target Audience
Existing or in-training IT security professionals seeking detailed security penetration testing skills

Prerequisites
A technical background with a solid understanding of networks and networking concepts, such as TCP/IP, IP Routing, and LAN Switching, as well as Windows and/or UNIX/LINUX operating systems; a general familiarity with the principles and usage of command-line, coding, and GUI-based technologies for manipulating IT operating systems

Expected Duration (hours)
1.0

Lesson Objectives

Deterring Electronic Intrusions

  • recognize the firewall architectures
  • identify ways to breach and bypass firewalls
  • identify ways in which to evade IDS
  • recognize the main IDS detection methods
  • recognize how honeypots can be used by IT security professionals
  • recognize key concepts about electronic intrusion detection and evasion methods
  • Course Number:
    sp_etih_a05_it_enus