Description
Course info
Rating
(23)
Level
Intermediate
Updated
Feb 8, 2018
Duration
1h 42m
Description

Pluralsight is not an official partner or accredited training center of EC-Council. Malicious users and software continuously scan networks looking for vulnerable devices and hosts. In this course, Firewalls and Intrusion Detection, you'll acquire the ability to determine how various types of firewalls should be deployed in your specific environment. First, you'll discover how to implement an intrusion detection system to detect suspicious activity. Next, you'll learn how to determine between honeypots and honeynets. Finally, you'll explore how honeynets and honeypots can be used as IT system decoys to track intruder actions in order to learn how production systems should be hardened. When you have completed this course, you will have the skills to implement various types of firewalls for specific environments.

About the author
About the author

Daniel Lachance, CompTIA Security+, CompTIA A+®, CompTIA Network+®, CompTIA Server+, CompTIA Cloud Essentials, MCITP, MCTS, MCSA, is the owner of Lachance IT Consulting Inc. He is the author of the CompTIA Server+ Certification All-in-One Exam Guide, CompTIA Cloud Essentials Certification Study Guide, and co-author of CompTIA Security+ Certification Practice Exams.

More from the author
Managing Microsoft Azure Subscriptions
Beginner
2h 8s
Jun 11, 2020
More courses by Daniel Lachance
Section Introduction Transcripts
Section Introduction Transcripts

Course Overview
Hi everyone. I'm Dan Lachance, and welcome to my course, Firewalls and Intrusion Prevention. Firewalls control traffic into and out of not only networks, but also individual hosts; so therefore, proper firewall placement and configuration is essential for proper protection at these levels. Intrusion detection and prevention systems take security a step further by monitoring networks and hosts for suspicious activity and either sending some kind of an alert or taking steps to stop the malicious actions from continuing. To track intrusions on fake decoy systems, we can deploy honeypots or collections of honeypots, which are called honeynets, and this can be deployed on an isolated network for security reasons. This way we have a way of tracking malicious user attack methods, as well as their IP addresses. Some of the major topics that we're going to cover include defining firewall best practices, including rules and placement, intrusion detection and prevention system deployment and configuration, and we'll also talk about the benefits of deploying honeypots. By the end of this course, you'll understand how to secure hosts and networks in alignment with corporate security policies using tools like firewalls, intrusion detection and prevention systems, and honeypots. I hope you'll join me to learn about firewalls and intrusion prevention, here at Pluralsight.