From the course: Ethical Hacking: Evading IDS, Firewalls, and Honeypots
Unlock the full course today
Join today to access over 22,600 courses taught by industry experts or purchase this course individually.
Understanding Firewalls
From the course: Ethical Hacking: Evading IDS, Firewalls, and Honeypots
Understanding Firewalls
- [Instructor] While many of today's breaches result from malware being delivered through web browsing and email accounts, direct penetration through hacking is still a significant issue. A key control to prevent this is the use of perimeter firewalls. These come in two forms: personal firewalls and endpoint devices and enterprise firewalls to protect business enclaves. These operate in essentially the same way. A firewall in its simplest form is designed to mediate access between two computers in different zones. Typical examples being an internal user browsing the internet and a connection from the internet into an internal business server. To do this, the firewall has a set of rules which instructs it to either allow or deny the connection based on various criteria, such as source and destination addresses, source and destination ports, and so on. Firewalls can be built into operating systems or can be standalone devices. Let's start by looking at the firewalls built into Windows…
Practice while you learn with exercise files
Download the files the instructor uses to teach the course. Follow along and learn by watching, listening and practicing.
Contents
-
-
-
(Locked)
Understanding Firewalls1m 2s
-
(Locked)
Apply the basics of the Windows firewall5m 17s
-
(Locked)
Use advanced features in the Windows Firewall8m 18s
-
(Locked)
Review firewall logs3m 22s
-
(Locked)
Understand Linux IPTables4m 14s
-
(Locked)
Set up an IPTables firewall2m 52s
-
(Locked)
Manage rules with Firewall Builder8m 24s
-
(Locked)
Port testing1m 7s
-
(Locked)
-
-
-
-
-
-