Join Malcolm Shore for an in-depth discussion in this video What you should know before watching this course, part of Ethical Hacking: Perimeter Defenses.
- [Instructor] This is a practical course, and during this course I'll be setting up and using tools to interact with perimeter devices such as firewalls and IDS. I'll be using the VirtualBox environment, and you should be familiar with using Kali Linux in its terminal shell, and the Windows command shell. We'll also be working at the RPV4 network level, and you'll want to be familiar with networking concepts, particularly around addressing and port management, and basic networking tools such as Netcat and Nmap.
We'll also be touching on the Cisco IOS operating system, and we'll use a number of tools for perimeter defense testing. But you'll learn about those during the course.
Note: Learning about ethical hacking for perimeter defenses is part of the Evading IDS, Firewalls, and Honeypots competency from the Certified Ethical Hacker (CEH) body of knowledge.
- Understanding firewalls
- Applying the basics of the Windows Firewall
- Using advanced features in the Windows Firewall
- Reviewing firewall logs
- Understanding Linux iptables
- Setting up an iptables firewall
- Managing rules with Firewall Builder
- Setting up a Cisco PIX firewall
- Creating a secure enclave
- Installing GNS3
- Understanding web application firewalls
- Protecting API services with the WSO2 gateway
- Running the Cowrie honeypot
- Detecting intrusions with Security Onion