5910 Breckenridge Pkwy Suite B, Tampa, FL. 33610
(800) 272-0707

SkillSoft Explore Course

IT Professional Certifications     EC Council     Certified Ethical hacker     Certified Ethical Hacker (CEH) v11

Intrusion detection and prevention systems are security controls that provide alerts and protection for many organizations today. In this course, you'll explore their function, commonly deployed IDS/IPS solutions, and techniques for evading detection by these systems. Next, you'll examine firewalls, their role as a security countermeasure, and techniques commonly used to bypass them. If you know how an attacker is likely to attack, you can build better defenses to protect your organization. Finally, you'll learn how honeypots can be used to determine the attacks a production network is most likely to face from threats. This course is one in a series that helps to prepare you for the Certified Ethical Hacker v11 (312-50) exam.



Objectives

CEHv11: Intrusion Prevention and Detection, Firewalls & Honeypots

  • describe the techniques that can be used to evade IDS/IPS
  • recognize the different alert types of deployed IDS/IPS solutions
  • recognize the function of intrusion detection and prevention systems (IDS/IPS)
  • describe how firewalls are used as a security countermeasure
  • describe how firewalls can be configured as a security countermeasure
  • describe techniques that are commonly used to bypass firewalls
  • describe the types of honeypots that can be used to build better defenses
  • identify how honeypots can be used to protect your organization