Ethical Hacker: Secure Technology & Applications
Security devices and software are the technical aspect of security. An ethical hacker must be familiar with security technology in order to effectively conduct tests of the target organizations network. In this 10-video course you will explore firewall types and usage SIEM systems intrusion detection systems and intrusion prevention systems (IDS/IPS) antivirus strategies Windows Firewall and how to implement Snort. Key concepts covered in this course include security devices and software concepts and how they relate to ethical hacking; learning to correctly deploy firewall solutions their relevance to ethical hacking and different types and usage; and learning the role of SIEM (security information and event management) and how to deploy SIEM systems. Next learners observe how to utilize IDS/IPS and its relationship to ethical hacking; learn antivirus concepts and implement an AV strategy; configure the firewall in Windows 10 and Windows Server 2019; and learn to configure Windows Defender. Conclude by learning how to implement basic Snort network IDS a tool that can be used for simple packet capture or for IDS.