This video summarizes the course and looks at what's next.
- [Malcolm] I'd really like to thank you…for joining me for this course.…I hope you enjoyed learning…how to understand and test perimeter defenses.…During the course, I showed you some useful tools…to emulate and test network perimeters,…and you can use these…to continue building your skills and experience.…There's always something new in cybersecurity,…and if you're interested in learning more,…then check out the full cybersecurity…ethical hacking segment of the security training library,…where new security testing courses are added regularly.…
You'll find a range of courses on ethical hacking…and security in general.…I'd like to invite you to go to my author page,…where you can find some additional courses on cybersecurity.…If you want to get hands-on with some of the common tools,…then do take a look at Practical Cybersecurity…and the Introduction to Kali Linux.…If you want to know how to test mobile devices,…then check out the mobile devices course.…If you'd like to learn about security for the cloud,…then Cybersecurity for Cloud Computing is for you.…
Released
2/15/2017Note: Learning about ethical hacking for perimeter defenses is part of the Evading IDS, Firewalls, and Honeypots competency from the Certified Ethical Hacker (CEH) body of knowledge.
- Understanding firewalls
- Applying the basics of the Windows Firewall
- Using advanced features in the Windows Firewall
- Reviewing firewall logs
- Understanding Linux iptables
- Setting up an iptables firewall
- Managing rules with Firewall Builder
- Setting up a Cisco PIX firewall
- Creating a secure enclave
- Installing GNS3
- Understanding web application firewalls
- Protecting API services with the WSO2 gateway
- Running the Cowrie honeypot
- Detecting intrusions with Security Onion
Share this video
Embed this video
Video: Summary