Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

LinkedIn Learning

Ethical Hacking: Evading IDS, Firewalls, and Honeypots

via LinkedIn Learning

Overview

Take your first steps into testing client defenses. Learn about firewalls, network simulation using GNS3, special-purpose perimeter devices, and intrusion response techniques.

Syllabus

Introduction
  • Finding weaknesses in the perimeter
  • What you should know
  • Course disclaimer
1. Firewalls
  • Understanding Firewalls
  • Apply the basics of the Windows firewall
  • Use advanced features in the Windows Firewall
  • Review firewall logs
  • Understand Linux IPTables
  • Set up an IPTables firewall
  • Manage rules with Firewall Builder
  • Port testing
2. Hardware Firewalls
  • Set up a Cisco PIX firewall
  • Create a secure enclave
3. Network Simulation Using GNS3
  • Install GNS3
  • Obtain network device images
  • Set up a network
  • Simulate the ASA firewall
  • Integrate Kali into GNS3
4. Special Purpose Perimeter Devices
  • Understand Web Application Firewalls
  • Protect API services with the WSO2 gateway
  • Understand honeypots
  • Run the Cowrie honeypot
5. Protection from Intrusion
  • Intrusion response techniques
  • xListing sites
  • Snort rules
  • Detect intrusions with Security Onion
  • Extend IDS with reputation
  • EINSTEIN
6. Evasion Techniques
  • Evading antivirus detection
  • Obfuscating payloads with msfvenom
  • Hiding payloads in benign files
  • Custom packaging of software
  • Fileless attacks with PowerShell
  • Hiding with the cloak of invisibility
  • Embedding malware in an alternate data stream
  • Checking for oversight
Conclusion
  • Next steps

Taught by

Malcolm Shore

Reviews

Start your review of Ethical Hacking: Evading IDS, Firewalls, and Honeypots

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.