Certified Ethical Hacker (CEH) v8: Evading IDS, Firewalls, and Honeypots

This course is included in our On-demand training solution.


IDS systems are network hosts designed to monitor for signs of suspicious activity that may indicate an attack. Firewalls are the front-line of network defence against attacks, allowing or disallowing traffic based on rules. A honeypot is a trap host set to either detect attacks, or deflect them away from more sensitive hosts. This course covers the tools and techniques used in evading these three types of network security. An ethical hacker is a person who attacks an organizations security on behalf of its owners in order to discover vulnerabilities. Instead of taking advantage of these vulnerabilities, the ethical hacker reports them to the organization who can then put in place the appropriate countermeasures to protect themselves against malicious hackers. This course is the fifteenth in a series of courses which can used in preparation for the Certified Ethical Hacker v8, 312-50, exam. The course has been developed in partnership with EC-Council and is based on their Ethical Hacking and Countermeasures V8 course materials and labs.

Target Audience

Network and information security professionals



Expected Duration

90 min.

Course Objectives

IDS, Firewall, and Honeypot Overview

  • identify a honeypot
  • IDS, Firewall, and Honeypot Tools

  • identify intrusion detection tools
  • IDS Evasion Techniques

  • identify types of attacks
  • Firewall and Honeypot Evasion

  • recognize firewall evasion tools
  • Countermeasures and Penetration Testing

  • identify firewall penetration testing techniques
  • IDS, Firewalls, and Honeypots





    Multi-license discounts available for Annual and Monthly subscriptions.