Module 1: Introduction to Ethical Hacking
Module 2: Hacking Lab Setup
Module 3: Networking Fundamentals
Module 4: Linux Basics for Ethical Hackers
Module 5: Information Gathering and Footprinting
Module 6: Scanning and Enumeration
Module 7: Vulnerability Assessment
Module 8: Web Application Security
Module 9: Exploitation Techniques - Part 1
Module 10: Exploitation Technique - Part 2
Module 11: Backdoor Generation, Weaponisation and Delivery
Module 12: Browser Exploitation
Module 13: Post-Exploitation and Lateral Movement
Module 14: Wireless Network Security
Module 15: Social Engineering and Physical Security
Module 16: Cryptography and Secure Communications
Module 17: Network Defense and Countermeasures
Module 18: Incident Response and Forensics
12.3. Using Intrusion Detection Systems (IDS) to Monitor Network Traffic
Using Intrusion Detection Systems (IDS) to monitor network traffic is an essential part of network security. IDS is a security
You are unauthorized to view this page.