Skip to Content
CEH Certified Ethical Hacker Cert Guide, 4th Edition
book

CEH Certified Ethical Hacker Cert Guide, 4th Edition

by Michael Gregg, Omar Santos
February 2022
Intermediate to advanced
752 pages
19h 37m
English
Pearson IT Certification
Content preview from CEH Certified Ethical Hacker Cert Guide, 4th Edition

Chapter 9

Evading IDS, Firewalls, and Honeypots

This chapter covers the following topics:

  • Intrusion Detection and Prevention Systems: Intrusion detection systems are one of the key pieces of technology used to detect malicious activity. There are also intrusion prevention systems (IPS), which are devices or software that sit inline and prevent cyberattacks.

  • Firewalls: Firewalls are devices set between trusted and untrusted networks and used to control the ingress and egress traffic.

  • Honeypots: These are fake systems designed to lure and “jail” an attacker so that real systems are not targeted.

This chapter introduces you to three technologies that can be used to help protect and guard the network: IDS and IPS, firewalls, and honeypots. ...

Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Certified Ethical Hacker (CEH) Study Guide

Certified Ethical Hacker (CEH) Study Guide

Matt Walker

Publisher Resources

ISBN: 9780137489930