5910 Breckenridge Pkwy Suite B, Tampa, FL. 33610
(800) 272-0707

SkillSoft Explore Course

IT Skills     Security     Security Accreditations and Best Practice     Certified Ethical Hacker (CEH) v10

Explore how to evade intrusion detection systems, firewalls, and honeypots. Examine the use of Nmap to evade firewalls and how to set up a honeypot.



Objectives

Certified Ethical Hacker - CEHv10: Evading IDS, Firewalls, and Honeypots

  • describe IDS, firewalls, and honeypots and use Nmap to evade firewalls
  • describe a honeypot setup and scan against it to potentially see inbound traffic