Module 16: Evading IDS, Firewalls, and Honeypots

Please purchase the course before starting the lesson.

Introduction: What tools are used in Ethical hacking to detect and prevent intrusions? What are they exactly? How do hackers evade security measures? This module explains this topic. IDS systems can be software based or hardware based. While some available are simple software applications, others are high-end hardware-based products. No matter the type of platform, [...]

Back to: Ultimate IT Security Certification Bundle > EC-Council Certified Ethical Hacker (CEHv10)