Take this
course

Software Development / Security & Encryption

Evading Firewalls and Honeypots

Learn how attackers anticipate honeypots and how penetration testing can help you in dealing with these attackers paired with demonstrations.

Description

In this Evading Firewalls and Honeypots course we will not only discuss what firewalls and honeypots are, but how attackers get around these preventive programs. You will learn about the different types of firewalls and how they may be evaded. You will also learn what honeypots are and how they are set-up to divert any would be attacker's attention. 


You will be learning how attackers anticipate honeypots and how penetration testing can help you in dealing with these attackers. We have paired this course with several demos that will cover more in-depth the topics that we will be discussing and help you gain a broader understanding of those topics. 


Topics Covered Include:

  • Working with Firewalls
  • Working with Honeypots

Take Advantage of our extra downloadable supplemental materials. 

**This .zip file includes PDF versions of our Script, PPT Slides, Quiz Questions, and vocabulary tools to better enhance your understanding for Evading Firewalls and Honeypots.

Full details

Curriculum

  • Working with Firewalls
    Introduction
    1:15
    Understanding Firewalls
    4:01
    Firewall Architectures
    2:37
    Types of Firewalls
    4:46
    Evading Firewalls
    6:31
    DEMO: Configuring Proxy
    1:18
    Evading Firewalls Using Tunneling
    2:53
    Evading Firewalls Using External Systems
    1:20
    Evading Firewalls Using MitM Attacks
    1:17
    Firewall Evasion Tools
    2:11
    DEMO: Firewall Bypassing and Penetration Testing
    1:24
    Firewall Evasion Tools Continued
    3:28
  • Working with Honeypots
    Honeypots Defined
    0:55
    Types of Honeypots
    3:29
    Detecting Honeypots
    2:10
    DEMO: Honeypot Using Atomic Software
    1:50
    Countermeasures
    1:32
    Penetration Testing
    3:31
  • Conclusion
    Conclusion
    1:10
    Evading Firewalls and Honeypots: Supplemental Materials
    Take advantage of all our extra downloadable supplemental materials. This .zip file includes PDF versions of our Script, PPT Slides, Quiz Questions, and vocabulary tools to better enhance your understanding for Evading Firewalls and Honeypots Chapters 1 & 2.

Skills

  • Information Systems Security
  • IT Security
  • Information Security
  • Certified Ethical Hacker (CEH)
  • CompTIA Security+
  • IT Certification
  • IT Security Certification

Similar Courses

More Courses by this Instructor