• Online, Self-Paced
Course Description

Explore how to evade intrusion detection systems, firewalls, and honeypots. Examine the use of Nmap to evade firewalls and how to set up a honeypot.

Learning Objectives

Certified Ethical Hacker - CEHv10: Evading IDS, Firewalls, and Honeypots

  • describe IDS, firewalls, and honeypots and use Nmap to evade firewalls
  • describe a honeypot setup and scan against it to potentially see inbound traffic

Framework Connections

Feedback

If you would like to provide feedback for this course, please e-mail the NICCS SO at NICCS@hq.dhs.gov.