Ethical Hacker: Secure Technology & Applications
Security devices and software are the technical aspect of security. An ethical hacker must be familiar with security technology in order to effectively conduct tests of the target organization s network. In this 10-video course you will explore firewall types and usage SIEM systems intrusion detection systems and intrusion prevention systems (IDS/IPS) antivirus strategies Windows Firewall and how to implement Snort. Key concepts covered in this course include security devices and software concepts and how they relate to ethical hacking; learning to correctly deploy firewall solutions their relevance to ethical hacking and different types and usage; and learning the role of SIEM (security information and event management) and how to deploy SIEM systems. Next learners observe how to utilize IDS/IPS and its relationship to ethical hacking; learn antivirus concepts and implement an AV strategy; configure the firewall in Windows 10 and Windows Server 2019; and learn to configure Windows Defender. Conclude by learning how to implement basic Snort network IDS a tool that can be used for simple packet capture or for IDS.