Select Your Favourite
Category And Start Learning.

( 0 Review )

Evading Ids, Firewalls and Honeypots

$22.00 $18.00

( 0 Review )

Course Level

All Levels

Total Hour

02h 55m

Video Tutorials


$22.00 $18.00

Course content

7 Lessons02h 55m

Section 1 : Evading IDS, firewalls, and honeypots

Lecture 2 : Installing snort IDS on Windows 7
Lecture 3 : How to create snort rules on Windows 7
Lecture 4 : Snort on Linux
Lecture 5 : Setting up vulnerable Windows 7 honeypot
Lecture 6 : Honeypots
Lecture 7 : Evading firewalls with Nmap and Kali Linux


Do you want to be the next desirable IT security professional? Knowing the fundamentals of ethical hacking and network security will give you an edge over others!

Just in case you didn’t know what IDS, Firewall, and Honeypots are,  Intrusion Detection System (IDS) is an alert system to monitor any intrusion or suspicious activities. These would be reported to the administrator. In network security, firewall systems are used to control the traffic by filtering and blocking unauthorized access.

Honeypots, on the other hand, allows you to create an environment to see how attackers would behave. It is a deception technology to lure attackers so that we can study their pattern of attacks, and hence the name ‘honeypot’.

What does the course offer?

In this course, you will learn how to evade security software applications like IDS, Firewalls, and Honeypots. You will be equipped to testing client defenses at the end of the course. The fundamentals of evading are taught. The basics of honeypots and firewalls, how they are designed to distract hackers and keep your confidential files safe.

The objective of this lab is to help students learn and detect intrusions in a network, log, and view all log files. You will learn how to:

  • Install and configure Snort IDS 
  • Create snort rules on Windows
  • Snort on Linux
  • Set up a vulnerable honeypot
  • Evade firewalls with Nmap and Kali Linux

Why should you learn this?

Malicious attackers exploiting the vulnerabilities in a system or a network for financial and psychological reasons have been growing in numbers. To stop the unauthorized intrusion into the systems and stealing valuable information, professional ethical hackers have become the need of the hour. With the permission of the owners of the system, an ethical hacker would find all the loopholes so that it can be monitored or fixed to keep them away from threats and attacks. Safety is the main concern for any organization. As an ethical hacker, you can be the savior to all the threats to the organization’s security. Understanding the mindset and patterns of the attacker is key in mastering ethical hacking.

Lurnweb also has other topics pertaining to the fundamentals of Ethical Hacking such as System hacking, session hijacking, denial of service, SQL injections, Web application attacks, hacking mobile devices, etc. With 50% off on all the courses, this would be the right time to grab them. Enroll to become the next big hacker in the town!

What to learn?

Detecting Intrusions using Snort on your own. Learn to detect Intruders and Worms using KFSensor Honeypot IDS.


  • No pre-requisites are required.
  • A laptop or PC with a strong internet connection.
  • Interest in learning.

Target Audience

  • Beginners who are interested in development.
  • IT professionals who are interested in enhancing their skills.


0 /5

103 Courses

$22.00 $18.00

Material Includes

  • 3-hours of video lectures
  • Lifetime access.
  • Certificate of completion.
  • 30-day money-back guarantee.
  • Self-paced learning.