Categories: Tutorials
Lynda - Ethical Hacking: Perimeter Defenses
Ethical hacking—testing to see if an organization's network is vulnerable to outside attacks—is a desired skill for many IT security professionals. In this course, cybersecurity expert Malcolm Shore prepares you to take your first steps into testing client defenses. Malcolm provides you with an overview of firewall technology, and demonstrates the two main operating system firewalls. Next, he goes into web application firewalls and API gateway threat mitigation solutions. Learn about the Cowrie honeypot, how to use Security Onion to detect intrusions, and more.
TO MAC USERS: If RAR password doesn't work, use this archive program:
RAR Expander 0.8.5 Beta 4 and extract password protected files without error.
TO WIN USERS: If RAR password doesn't work, use this archive program:
Latest Winrar and extract password protected files without error.
Coktum |
Related Posts
Information
Members of Guests cannot leave comments.