Featured resource
pluralsight tech forecast
2025 Tech Forecast

Which technologies will dominate in 2025? And what skills do you need to keep up?

Check it out
Hamburger Icon
  • Course
    • Libraries: If you want this course, consider one of these libraries.
    • Security

Ethical Hacking: Network and Perimeter Hacking

This course will teach Network and Perimeter Hacking concepts needed for the Certified Ethical Hacking Exam.

Michael Teske - Pluralsight course - Ethical Hacking: Network and Perimeter Hacking
by Michael Teske

What you'll learn

Acquiring the knowledge and skills needed to pass a certification exam is a challenge. In this course, Ethical Hacking: Network and Perimeter Hacking, you’ll learn the network and perimeter hacking concepts needed for the exam objective. First, you’ll explore DoS concepts. Next, you’ll discover the different session hijacking concepts and types. Finally, you’ll identify evading IDS, firewall, and honeypot concepts. When you’re finished with this course, you’ll have the skills and knowledge of network and perimeter hacking needed for the Certified Ethical Hacker exam.

Table of contents

About the author

Michael Teske - Pluralsight course - Ethical Hacking: Network and Perimeter Hacking
Michael Teske

Michael Teske is an Author Evangelist with Pluralsight helping people elevate their skills. He has 20+ years of experience in IT Ops, including 17 as an IT instructor at a community college.

More Courses by Michael