From the course: Ethical Hacking: Evading IDS, Firewalls, and Honeypots

Unlock the full course today

Join today to access over 22,500 courses taught by industry experts or purchase this course individually.

Next steps

Next steps

- [Malcolm] I'd really like to thank you for joining me for this course. I hope you enjoyed learning about perimeter defenses. There's always something new in cybersecurity and if you're interested in learning more, then check out the full cybersecurity ethical hacking segment of the library, where new security testing courses are added regularly. You'll find a range of courses on ethical hacking and security, in general. I'd like to invite you to visit my LinkedIn Learning page and check out my ethical hacking, security, and programming courses. If you want to learn about how to test mobile devices, then check out the Mobile Devices course. If you'd like to learn about security for the cloud, then Cybersecurity for Cloud Computing is for you. Thanks again for joining me on this course and I hope to see you again soon.

Contents