Firewalls and Intrusion Detection

Firewalls and Intrusion Detection

English | MP4 | AVC 1280×720 | AAC 44KHz 2ch | 1h 42m | 221 MB

Proper firewall configuration and placement can increase network and host security along with intrusion detection systems. This course will cover what you need to know about security solutions from concepts to implementation.

Malicious users and software continuously scan networks looking for vulnerable devices and hosts. In this course, Firewalls and Intrusion Detection, you’ll acquire the ability to determine how various types of firewalls should be deployed in your specific environment. First, you’ll discover how to implement an intrusion detection system to detect suspicious activity. Next, you’ll learn how to determine between honeypots and honeynets. Finally, you’ll explore how honeynets and honeypots can be used as IT system decoys to track intruder actions in order to learn how production systems should be hardened. When you have completed this course, you will have the skills to implement various types of firewalls for specific environments.

Table of Contents

01 – Course Overview
02 – Module Introduction
03 – Firewall Overview
04 – Packet Filtering Firewalls
05 – Firewall Rulesets
06 – Demo – Linux Firewall Rules
07 – Demo – Configure Windows Firewall Rules
08 – Demo – AWS Firewall Rules
09 – Network Address Translation
10 – Virtual Private Networks
11 – Bastion Hosts and Screened Subnets
12 – Proxy Servers
13 – Module Summary
14 – Module Introduction
15 – IDS_IPS Overview
16 – IDS_IPS Configuration
17 – IDS_IPS Components
18 – IDS_IPS Implementation
19 – Demo – Configure the Snort IDS
20 – Demo – Start the Snort IDS
21 – Module Summary
22 – Module Introduction
23 – Honeypot Overview
24 – Honeynets
25 – Demo – Download and Run Honeydrive
26 – Demo – Configure the Honeydrive Virtual Machine