Ethical Hacking: Network and Perimeter Hacking
by Michael Teske
This course will teach Network and Perimeter Hacking concepts needed for the Certified Ethical Hacking Exam.
What you'll learn
Acquiring the knowledge and skills needed to pass a certification exam is a challenge. In this course, Ethical Hacking: Network and Perimeter Hacking, you’ll learn the network and perimeter hacking concepts needed for the exam objective. First, you’ll explore DoS concepts. Next, you’ll discover the different session hijacking concepts and types. Finally, you’ll identify evading IDS, firewall, and honeypot concepts. When you’re finished with this course, you’ll have the skills and knowledge of network and perimeter hacking needed for the Certified Ethical Hacker exam.
About the author
Michael Teske is a principal security author with Pluralsight helping people build their skills toolkit. Michael has 25+ years of experience in the IT Ops/Cloud/Cybersecurity industry including 17 of those years as an IT instructor at a technical college, focusing on Microsoft server infrastructure, security and automation. Michael attained his MBA with an emphasis in Computer Information System Security several years ago. Michael still keeps up with the industry as an independent consultant in ... morehis spare time. Michael finds personal and professional growth by helping others discover the world of technology by sharing his passion as a tech enthusiast in all aspects. He understands the worker shortage in the cybersecurity space and continues to be an advocate for an industry that has provided a fulfilling career for himself.