Chapter 10IDS, Firewalls, and Honeypots

This Chapter helps you prepare for the EC-Council Certified Ethical Hacker (CEH) Exam by covering the following EC-Council objectives, which include understanding the business aspects of penetration testing. This includes items such as

Identify IDS components

Image IDS systems are composed of network sensors, central monitoring systems, report analysis systems, database and storage components, and the response box.

Identify IDS alert types

Image Alert types include positives, negative, false positives, and ...

Get Certified Ethical Hacker Exam Prep now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.