Size: 262 MB

Ethical hacking—testing to see if an organization’s network is vulnerable to outside attacks—is a desired skill for many IT security professionals. In this course, cybersecurity expert Malcolm Shore prepares you to take your first steps into testing client defenses. Malcolm provides you with an overview of firewall technology, and demonstrates the two main operating system firewalls. Next, he goes into web application firewalls and API gateway threat mitigation solutions. Learn about the Cowrie honeypot, how to use Security Onion to detect intrusions, and more.

Note: Learning about ethical hacking for perimeter defenses is part of the Evading IDS, Firewalls, and Honeypots competency from the Certified Ethical Hacker (CEH) body of knowledge.

Topics include:

  • Understanding firewalls
  • Applying the basics of the Windows Firewall
  • Using advanced features in the Windows Firewall
  • Reviewing firewall logs
  • Understanding Linux iptables
  • Setting up an iptables firewall
  • Managing rules with Firewall Builder
  • Setting up a Cisco PIX firewall
  • Creating a secure enclave
  • Installing GNS3
  • Understanding web application firewalls
  • Protecting API services with the WSO2 gateway
  • Running the Cowrie honeypot
  • Detecting intrusions with Security Onion

HOMEPAGE – https://www.lynda.com/Linux-tutorials/Ethical-Hacking-Perimeter-Defenses/540350-2.html

Download Links-

Note: Comment below if you find any link dead or getting problem in downloading files.

You May Also Like

eLearnSecurity – Penetration Testing Student
Cybersecurity for IT Professionals
Ethical Hacking: Mobile Devices and Platforms
Categories: CoursesSecurity

2 Comments

Wendy · October 22, 2020 at 3:53 pm

These links do not work, kindly update the links.

Thanks for the such a wonderful efforts to upload the excellent training.

Regards
Wen

    admin · October 28, 2020 at 5:07 pm

    Links are updated now.

Leave a Reply

Your email address will not be published. Required fields are marked *