Ethical Hacking: Evading IDS, Firewalls, and Honeypots

Protect your information from hackers using the most modern methods. This course looks at how security defenses such as intrusion detection systems, firewalls, and honeypots are intended to work and how attackers typically circumvent them.
Course info
Rating
(40)
Level
Beginner
Updated
May 3, 2016
Duration
3h 0m
Table of contents
Description
Course info
Rating
(40)
Level
Beginner
Updated
May 3, 2016
Duration
3h 0m
Description

Most modern networks are protected by a combination of intrusion detection systems and firewalls. Increasingly, they may also include honeypots as a means of early detection of malicious activity. Attackers are constantly looking for ways of evading these defenses in order to render them ineffective. They're seeking to both gain access to resources which are intended to be beyond their reach, and do so in a stealthy manner so as to go undetected. In this course, we'll look at the advantages each of these security defenses provides and the roles they play in securing networks. We'll then look at how attackers seek to undermine their effectiveness by employing a range of techniques that help them evade detection. This course is part of the Ethical Hacking Series. http://blog.pluralsight.com/learning-path-ethical-hacking.

About the author
About the author

Troy is a Software Architect, Microsoft MVP for Developer Security and ASPInsider. He's a regular conference speaker, frequent blogger at troyhunt.com and is the author of the OWASP Top 10 for .NET developers series and the free eBook of the same name.

More from the author
Play by Play: Emerging Threats in IoT
Beginner
57m 21s
12 Oct 2017
Play by Play: Azure Beyond Websites
Beginner
1h 16m
14 Apr 2017
More courses by Troy Hunt