5910 Breckenridge Pkwy Suite B, Tampa, FL. 33610
(800) 272-0707

SkillSoft Explore Course

IT Skills     Security     Security Accreditations and Best Practice     Certified Ethical Hacker (CEH) v10

Explore how to evade intrusion detection systems, firewalls, and honeypots. Examine the use of Nmap to evade firewalls and how to set up a honeypot, as you prepare for the 312-50: Certified Ethical Hacker v10 exam.



Objectives

Certified Ethical Hacker - CEHv10: Evading IDS, Firewalls, and Honeypots

  • describe IDS alerts when reading IDS statements
  • describe more techniques to gather information regarding an intruder
  • describe NAT devices that help to filter traffic and set security policies
  • describe a method of scanning a specified honeypot with NMAP
  • describe best practices when configuring honeypot
  • describe more methods of scanning honeypots
  • describe the use of several honeypots on a network