Chapter 10IDS, Firewalls, and Honeypots
This Chapter helps you prepare for the EC-Council Certified Ethical Hacker (CEH) Exam by covering the following EC-Council objectives, which include understanding the business aspects of penetration testing. This includes items such as
Identify IDS components
IDS systems are composed of network sensors, central monitoring systems, report analysis systems, database and storage components, and the response box.
Identify IDS alert types
Alert types include positives, negative, false positives, and ...
Get Certified Ethical Hacker Exam Prep now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.