VJ Security

VJ Security Is An Free Online Learning Website

ETHICAL HACKING - PERIMETER DEFENSES

ETHICAL HACKING - PERIMETER DEFENSES

Ethical Hacking
(Perimeter Defenses)


Topics Cover In This Course

Introduction:
  • Welcome
  • What you should know before watching this course
  • Course disclaimer
Firewalls:
  • Understanding firewalls
  • Applying the basics of the Windows Firewall
  • Using advanced features in the Windows Firewall
  • Reviewing firewall logs
  • Understanding Linux IPTables
  • Setting up an IPTable firewall
  • Managing rules with Firewall Builder
  • Port testing
Hardware Firewalls:
  • Setting up a Cisco PIX firewall
  • Creating a secure enclave
Network Simulation Using GNS3:
  • Installing GNS3
  • Obtaining network device images
  • Setting up a network
  • Simulating the ASA firewall
  • Integrating Kali into GNS3
Special-Purpose Perimeter Devices:
  • Understanding web application firewalls
  • Protecting API services with the WSO2 gateway
  • Understanding honeypots
  • Running the Cowrie honeypot
  • Detecting intrusions with Security Onion
Conclusion:
  • Conclusion


That Is All

Subscribe Our YouTube Channel And Stay Tuned

Brought To You Free By VJ SECURITY

Thank You

Post a Comment

0 Comments