Ethical Hacking
(Perimeter Defenses)
Topics Cover In This Course
Introduction:
- Welcome
- What you should know before watching this course
- Course disclaimer
- Understanding firewalls
- Applying the basics of the Windows Firewall
- Using advanced features in the Windows Firewall
- Reviewing firewall logs
- Understanding Linux IPTables
- Setting up an IPTable firewall
- Managing rules with Firewall Builder
- Port testing
- Setting up a Cisco PIX firewall
- Creating a secure enclave
- Installing GNS3
- Obtaining network device images
- Setting up a network
- Simulating the ASA firewall
- Integrating Kali into GNS3
- Understanding web application firewalls
- Protecting API services with the WSO2 gateway
- Understanding honeypots
- Running the Cowrie honeypot
- Detecting intrusions with Security Onion
- Conclusion
That Is All
Subscribe Our YouTube Channel And Stay Tuned
⇓
Brought To You Free By VJ SECURITY
⇓
Thank You
0 Comments