Ethical Hacking: Network and Perimeter Hacking
by Michael Teske
This course will teach Network and Perimeter Hacking concepts needed for the Certified Ethical Hacking Exam.
What you'll learn
Acquiring the knowledge and skills needed to pass a certification exam is a challenge. In this course, Ethical Hacking: Network and Perimeter Hacking, you’ll learn the network and perimeter hacking concepts needed for the exam objective. First, you’ll explore DoS concepts. Next, you’ll discover the different session hijacking concepts and types. Finally, you’ll identify evading IDS, firewall, and honeypot concepts. When you’re finished with this course, you’ll have the skills and knowledge of network and perimeter hacking needed for the Certified Ethical Hacker exam.
About the author
Michael Teske is an Author Evangelist with Pluralsight helping people build their skills toolkit. Michael has 20+ years of experience in the IT Ops industry including 17 of those years as an IT instructor at a technical college focusing on Microsoft server infrastructure solutions as well as Microsoft enterprise applications including automation using PowerShell. During his time as an instructor, Michael has developed curriculum for several courses as well as authored curriculum for Microsoft's ... moreTechnology Associate certification tracks. Michael attained his MBA with an emphasis in Computer Information System Security several years ago. Michael still keeps up with the industry as an independent consultant in his spare time. Michael finds personal and professional growth by helping others discover the world of technology by sharing his passion as a tech enthusiast in all aspects. He understands the worker shortage in IT and continues to be an evangelist for an industry that has provided a fulfilling career for himself.