Explore cyber defense, the tools used to detect and prevent cyberattacks, and the underlying protocols
Discuss how to protect your test network by adding web servers, intrusion detection, and firewalls
Build layered defense architecture to use for testing
Practice deploying honeypots and decoys on your network
About this course:
This hands-on course introduces core defensive strategies and security tools for various environments. Topics covered include: setting up virtual environments for penetration testing; router emulation; implementing firewalls; implementing a web server; vulnerability scanners; intrusion detection and prevention systems; and attack methodologies.