Ethical Hacker: Evading IDS Firewall & Honeypots
Explore how to evade intrusion detection systems firewalls and honeypots as you prepare for the 312-50: Certified Ethical Hacker v10 exam. Watch these videos and learn how to interpret IDS alerts from IDS statements specify NAT devices that filter traffic and set security policies and recall more techniques to gather information about an intruder. From there you will learn how to recite best practices to configure a honeypot explain the use of several honeypots on a network describe a method to scan a specified honeypot with NMAP and list more methods to scan honeypots.