arrow_back
Back
lock
Introduction To Course
lock
Module 1: Introduction To Course
lock
Understanding Intrusion Techniques
lock
Module 2: Understanding Types of Intrusion Detection
lock
How Hackers Hack in Companies
lock
Module 3: How Hackers Hack in Companies
lock
Overview of Honeypot
lock
Module 4: Overview of Honeypots
lock
Launching your First EC2 Instance
lock
Module 5: Creating EC2 Instance in AWS- Ubuntu
lock
Putty SSH Client Software Setup
lock
Module 6: Installing PuttyGen and Putty SSH
lock
Setting your OWN Honeypot
lock
Module 7.1: Setting Honeypot Installation
lock
Module 7.2: Honeypot Setup Continued
lock
Attacking and Checking Logs
lock
Module 8.1: Attacking the Server
lock
Module 8.2: Checking the Logs in Server
Preview - Setting Up Your Own Honeypot
Discuss (
0
)
navigate_before
Previous
Next
navigate_next