Ethical Hacking: Evading IDS, Firewalls, and Honeypots

Take your first steps into testing client defenses. Learn about firewalls, network simulation using GNS3, special-purpose perimeter devices, and intrusion response techniques.
  • Content

    • 9468