Ethical Hacking: Evading IDS, Firewalls, and Honeypots
Protect your information from hackers using the most modern methods. This course looks at how security defenses such as intrusion detection systems, firewalls, and honeypots are intended to work and how attackers typically circumvent them.
May 3, 2016
Table of contents