logo

Chapter 08 - Network and Application Security II - Ethical Hacker - 12/25

Chapter 08 - Network and Application Security II - Ethical Hacker - 12/25
Course content
Chapter Kick-off
Network & Application Security II Chapter Kick-off
Firewall
What Is a Firewall?
How Do Firewalls Work?
Ready, Set, Lab! - Configuring Windows Firewalls
Iptables - Tool Introduction
Firewall in Linux
Ready, Set, Lab! - Configuring Chain Rules in Iptables
What is Segmentation?
Host-Based Firewall vs. Network-Based Firewall
IDS & IPS
What are IDS and IPS?
How Does an IDS Function?
IDS Approaches
The Role of an IPS
NIDS & HIDS
Snort - Tool Introduction
Snort Rules
Snort Modes
Snort Cheat Sheet
Ready, Set, Lab! - Snort Detections and Analysis
Ready, Set, Lab! - IDS - Real life Scenario
IDS The Mission
LS: IDS - Real Life Scenario
SIEM
What is SIEM?
How Does It Work?
SIEM Architecture
SIEM Alert Structure
Correlation Rules
Correlation Rules - Practice
SIEM Objectives
What Is Splunk?
Splunk - Tool Introduction
Splunk Features
Splunk Components
Splunk's Interface
Ready, Set, Lab! - Splunk Investigation and Dashboarding
LS: Splunk Investigation and Dashboarding
Ready, Set, Lab! - SIEM Real Life Scenario
SIEM Real Life Scenario - The Case
LS: SIEM Real Life Scenario
Chapter Closure
Network & Application Security II Quiz
10Questions

Teachers


TechDX