The Complete Ethical Hacking Series: Honeypots, IDS and FW's
5.0 (2 ratings)
Instead of using a simple lifetime average, Udemy calculates a course's star rating by considering a number of different factors such as the number of ratings, the age of ratings, and the likelihood of fraudulent ratings.
12 students enrolled
Wishlisted Wishlist

Please confirm that you want to add The Complete Ethical Hacking Series: Honeypots, IDS and FW's to your Wishlist.

Add to Wishlist

The Complete Ethical Hacking Series: Honeypots, IDS and FW's

Complete Ethical Hacking Series (CEHv9): Honeypots, IDS and Firewalls
5.0 (2 ratings)
Instead of using a simple lifetime average, Udemy calculates a course's star rating by considering a number of different factors such as the number of ratings, the age of ratings, and the likelihood of fraudulent ratings.
12 students enrolled
Created by Chad Russell
Last updated 7/2017
English
Curiosity Sale
Current price: $10 Original price: $20 Discount: 50% off
30-Day Money-Back Guarantee
Includes:
  • 1.5 hours on-demand video
  • Full lifetime access
  • Access on mobile and TV
  • Certificate of Completion
What Will I Learn?
  • You will be able to install and deploy honeypots and IDS systems.
View Curriculum
Requirements
  • Students should have a working understanding of TCP/IP and networking concepts.
Description

Complete Ethical Hacking Series:  Honeypots, IDS and FW's

This course is for beginners and IT pros looking to get certified and land an entry level Cyber Security position paying upwards of six figures!   Each chapter closes with exercises putting your new learned skills into practical use immediately.  

What are the pre-requisites for this course?

  1. Students should have a working understanding of TCP/IP and networking concepts. 

What will you be able to do after taking this course?

  • Honey driveHoneyDrive is the premier honeypot Linux distro. It is a virtual appliance (OVA) with Xubuntu Desktop 12.04.4 LTS edition installed. It contains over 10 pre-installed and pre-configured honeypot software packages such as Kippo SSH honeypot, Dionaea and Amun malware honeypots, Honeyd low-interaction honeypot, Glastopf web honeypot and Wordpot, Conpot SCADA/ICS honeypot, Thug and PhoneyC honeyclients and more. Additionally it includes many useful pre-configured scripts and utilities to analyze, visualize and process the data it can capture, such as Kippo-Graph, Honeyd-Viz, DionaeaFR, an ELK stack and much more. Lastly, almost 90 well-known malware analysis, forensics and network monitoring related tools are also present in the distribution.
  • Kippo - Kippo is a medium interaction SSH honeypot designed to log brute force attacks and, most importantly, the entire shell interaction performed by the attacker.
  • Snort - Snort is an open-source, free and lightweight network intrusion detection system ( NIDS) software for Linux and Windows to detect emerging threats.
  • DNSSec - Domain Name System Security Extensions (DNSSEC) is a suite of extensions that add security to the Domain Name System (DNS) protocol by enabling DNS responses to be validated. Specifically, DNSSEC provides origin authority, data integrity, and authenticated denial of existence.




    Who is the target audience?
    • This course is for beginners and IT pros looking to get certified and land an entry level Cyber Security position paying upwards of six figures! There are currently over a million Cyber Security job openings global and demand is greatly outpacing supply which means more opportunity, job security and higher pay for you! Each chapter closes with exercises putting your new learned skills into practical use immediately.
    Students Who Viewed This Course Also Viewed
    Curriculum For This Course
    11 Lectures
    01:39:11
    +
    The Complete Ethical Hacking Series: Honeypots, IDS and FW's
    11 Lectures 01:39:11


    Advanced IDS
    06:20

    Honeypots
    06:36

    Honeydrive Installation
    01:10

    Kippo SSH Honeypot
    06:50

    • A firewall is a network security device that monitors incoming and outgoing network traffic and decides whether to allow or block specific traffic based on a defined set of security rules.
      Firewalls have been a first line of defense in network security for over 25 years. They establish a barrier between secured and controlled internal networks that can be trusted and untrusted outside networks, such as the Internet.  A firewall can be hardware, software, or both.
    Firewalls
    03:30

    Advanced Perimeter Security
    12:17

    LAN Security
    13:09

    Threat Management
    08:29

    DNSSec
    04:45
    About the Instructor
    Chad Russell
    3.6 Average rating
    1,050 Reviews
    16,809 Students
    24 Courses
    Join the Cyber Security Industry in 2016!

    Instructor Bio – Chad Russell

    Join the Cyber Security Industry in 2017!

    If you are interested in starting a career in the Cyber Security Industry 2016 is the time! 

    Learning the fundamentals of Cyber Security provides you with  a powerful and very useful set of skills.  Study Penetration Testing and Ethical Hacking and learn to think like a hacker so you can better defend your networks and data.   

    Jobs in Cyber Security are plentiful, and getting Security+ Certified will give you a strong background to more easily pick up and tackle more advanced exams such as the Certified Ethical Hacker and CISSP certifications.  

    Get certified and land an entry level Cyber Security position paying upwards of six figures!  There are currently over a million Cyber Security job openings global and demand is greatly outpacing supply which means more opportunity, job security and higher pay for you!   

    But, don't take my word for it...please take a look at the FREE previews (they are available in all my courses) and see for yourself.  This year I have partnered with webofsecurity.com, a premier provider of ‘All Things Information Security’ to bring you a fantastic suite of Cyber Security certification training to help you get into the hottest industry in IT. 

    About me:

    Hello, I’m Chad Russell.  I’ve been in the CyberSecurity industry for over 15 years.  I’ve taught Microsoft Engineering courses as a Certified trainer, I’ve managed teams of security engineers and analysts for an internet banking provider, I’ve been an information security consultant working for companies including SAP, Microsoft and Oracle.   

    I lead and conduct 'Security Risk Assessments' for customers throughout North America with an emphasis on cloud security, identity governance, network security, social engineering, mobile security, breach assessments, database security and access management.  

    Over the past 15 years I've held numerous certifications including CISSP, CCNP, MCSE and MCDBA certifications and have a B.S. in Computer Science from Excelsior College  I can help you get certified and get ahead!