From the course: Ethical Hacking: Evading IDS, Firewalls, and Honeypots

Finding weaknesses in the perimeter

From the course: Ethical Hacking: Evading IDS, Firewalls, and Honeypots

Start my 1-month free trial

Finding weaknesses in the perimeter

- [Malcom] While many cyber attacks may start with social engineering, the actual breach occurs after the malware or an intruder has got inside the perimeter. Consequently, businesses place a lot of emphasis on using firewalls, intrusion detection systems, and sometimes Honeypots to protect the perimeter. In this course, I'll cover the major perimeter protection devices. I'll start by explaining and demonstrating the basics of firewall technology. We'll take a look at web application firewalls and API gateway threat mitigation solutions, and we'll learn about the carrier Honeypot and how operational security teams use security onion for intrusion detection and alerting. We'll then take a look at the evasion techniques used by malware and intruders, and we'll demonstrate some evasive attacks. I'm Malcolm Shore, and I spent a career developing and running security programs for governments and businesses. I'd like to invite you to take this course and learn about perimeter defenses and how our adversaries evade them.

Contents