Enrolment options
Linked learning / IT / Security
Ethical Hacking: Evading IDS, Firewalls, and Honeypots
Take your first steps into testing client defenses. Learn about firewalls, network simulation using GNS3, special-purpose perimeter devices, and intrusion response techniques.
Guests cannot access this course. Please log in.