dots bg

(CEH) Evading IDS, Firewalls, and Honeypots

This module of the CEH certification focuses on techniques to bypass security mechanisms such as Intrusion Detection Systems (IDS), Firewalls, and Honeypots. Learners are trained in strategies to avoid detection while conducting penetration tests, emphasizing stealth techniques that help in understanding how these security devices and systems work. Topics include packet crafting, firewall evasion, IDS/IPS evasion techniques, and the use of tunneling methods to circumvent defenses. The course is designed to equip ethical hackers with the skills necessary to test and secure networks effectively while avoiding detection from these crucial security layers.

Course Instructor MYB

₹599.00

dots bg

Course Overview

Schedule of Classes

Course Curriculum

1 Subject

(CEH) Evading IDS, Firewalls, and Honeypots

7 Learning Materials

Evading IDS, Firewalls, and Honeypots

Evading fundamentals.mp4

Video
33:47
FREE

Installing snort IDS on windows .mp4

Video
23:55

How to create snort rules on Windows .mp4

Video
29:50
FREE

Snort on Linux.mp4

Video
40:12

Setting up vulnerable Windowshoneypot.mp4

Video
12:32

HoneyPots.mp4

Video
21:48

Evading Firewalls with Nmap and Kali Linux.mp4

Video
11:35

Course Instructor

tutor image

MYB

67 Courses   •   95 Students