From the course: Ethical Hacking: Evading IDS, Firewalls, and Honeypots

What you should know

From the course: Ethical Hacking: Evading IDS, Firewalls, and Honeypots

Start my 1-month free trial

What you should know

- [Instructor] This is a practical course. And during this course, I'll be setting up and using tools to interact with perimeter devices, such as firewalls and IDS. I'll be using the VirtualBox environment, and you should be familiar with using Kali Linux and its terminal shell, and the Windows command shell. We'll also be working at the IPv4 network level and you'll want to be familiar with networking concepts, particularly around addressing import management and basic networking tools such as netcat and Nmap. We'll also be touching on the Cisco IOS operating system and we'll use a number of tools for perimeter defense testing but you'll learn about those during the course.

Contents