Author
Updated
2/10/2021Released
7/10/2019Note: The topics covered in this course are drawn from the Evading IDS, Firewalls, and Honeypots competency in the Certified Ethical Hacker (CEH) body of knowledge.
- Applying the basics of the Windows Firewall
- Using advanced features in the Windows Firewall
- Reviewing firewall logs
- Linux iptables
- Setting up an iptables firewall
- Managing rules with Firewall Builder
- Setting up a Cisco PIX firewall
- Installing GNS3
- How web application firewalls protect web servers
- Protecting API services with the WSO2 gateway
- Running the Cowrie honeypot
- Detecting intrusions with Security Onion
Skill Level Intermediate
Duration
Views
- [Malcom] While many cyber attacks may start with social engineering, the actual breach occurs after the malware or an intruder has got inside the perimeter. Consequently, businesses place a lot of emphasis on using firewalls, intrusion detection systems, and sometimes Honeypots to protect the perimeter. In this course, I'll cover the major perimeter protection devices. I'll start by explaining and demonstrating the basics of firewall technology. We'll take a look at web application firewalls and API gateway threat mitigation solutions, and we'll learn about the carrier Honeypot and how operational security teams use security onion for intrusion detection and alerting. We'll then take a look at the evasion techniques used by malware and intruders, and we'll demonstrate some evasive attacks. I'm Malcolm Shore, and I spent a career developing and running security programs for governments and businesses. I'd like to invite you to take this course and learn about perimeter defenses and how our adversaries evade them.
Related Courses
-
Ethical Hacking: Scanning Networks
with Lisa Bock2h 6m Intermediate -
Ethical Hacking: Session Hijacking
with Malcolm Shore1h 13m Intermediate -
Ethical Hacking: Footprinting and Reconnaissance
with Lisa Bock1h 42m Intermediate -
Ethical Hacking: Enumeration
with Malcolm Shore1h 57m Intermediate
-
Introduction
-
Course disclaimer1m 10s
-
1. Firewalls
-
Understanding Firewalls1m 2s
-
Review firewall logs3m 22s
-
Understand Linux IPTables4m 14s
-
Set up an IPTables firewall2m 52s
-
Port testing1m 7s
-
-
2. Hardware Firewalls
-
Set up a Cisco PIX firewall3m 15s
-
Create a secure enclave3m 42s
-
-
2. Hardware Firewalls
-
Set up a Cisco PIX firewall3m 15s
-
Create a secure enclave3m 42s
-
-
3. Network Simulation Using GNS3
-
Install GNS36m 33s
-
Obtain network device images2m 24s
-
Set up a network4m 35s
-
Simulate the ASA firewall6m 38s
-
Integrate Kali into GNS34m 46s
-
-
4. Special Purpose Perimeter Devices
-
Understand honeypots4m 2s
-
Run the Cowrie honeypot1m 58s
-
5. Protection from Intrusion
-
xListing sites1m 2s
-
Snort rules5m 28s
-
Extend IDS with reputation2m 35s
-
EINSTEIN2m 42s
-
6. Evasion Techniques
-
Evading antivirus detection1m 24s
-
Checking for oversight1m 21s
-
-
Conclusion
-
Next steps53s
-
- Mark as unwatched
- Mark all as unwatched
Are you sure you want to mark all the videos in this course as unwatched?
This will not affect your course history, your reports, or your certificates of completion for this course.
CancelTake notes with your new membership!
Type in the entry box, then click Enter to save your note.
1:30Press on any video thumbnail to jump immediately to the timecode shown.
Notes are saved with you account but can also be exported as plain text, MS Word, PDF, Google Doc, or Evernote.
Share this video
Embed this video
Video: Finding weaknesses in the perimeter