What is a Honeypot - Cyber Security Tutorial

Описание к видео What is a Honeypot - Cyber Security Tutorial

What is a Honeypot is a free tutorial by Alton Hardin from Cyber Security course
Link to this course(Special Discount):
https://www.udemy.com/course/mta-98-3...
This is the best Cyber Security Course
Course summary:
This is a complete and comprehensive Microsoft MTA 98-367 Security Fundamentals Certification course and practice exams bundle. It�s designed to prepare you to be able to take and pass the certification exam needed to become Microsoft MTA 98-367 Certified.
Once you complete the course, you�ll have the knowledge and confidence to pass the Microsoft MTA 98-367 Security Fundamentals Certification exam AND the skills to begin working as an IT professional. This course is ideal as both a study tool and an on-the-job reference.
Your new skills and the Microsoft MTA 98-367 Certified will help you land an IT tech job or if you�re already working in IT, get a raise or advance in your career.
English [Auto]
In this video we're going to talk about pot. So what is a honey pot. Well here's a diagram of a honey pot. What it is is that a honey pot is a decoy server or multiple servers and they're typically placed in a DMZ which we see down here. We have our firewall. We have our DMC over here with a honey pot in it. And then our internal network protected on a different interface on the firewall and the whole purpose of these honey pot being in a DMZ is they're designed to entice malicious users meaning hackers to attack them rather than our internal network. And so how does this work. Well they're set up to look just like live production servers how ever the I.T. personnel are going to poorly configured them to make them much easier to exploit than or actual production servers. So they're more enticing to attack. They're easier to get into. They're easier to exploit. So why do we use a honeypot. Well they serve a twofold purpose. The first one of course makes sense and it's kind of straight forward is a lure that the hackers away from our real network. So we would much rather have them attack our honeypot than our real production internal network. The second thing is that honey pots allow our I.T. personnel to observe and learn how hackers are attacking our system. So we get to learn their methodologies for how they're exploiting weaknesses and vulnerabilities within our systems so we can better secure them. So that's a honey pot. And like I said they're typically set up within a DMZ. They could be an actual physical server they could be multiple servers they could be multiple servers at a virtualize within a single physical server the way what's their setup is really just going to be dependent upon the organization. But like I said they're typically setup in their own DMZ off on a different interface on our firewall. I mean in regards to the role that they play in network isolation will they play a role in isolating or at least enticing the attackers to their own isolated portion of the network rather than our internal network. So that's going to conclude our short introduction and overview into honey pots. So if you have any questions please let me know if not thanks for watching and I'll see you at the next video.
What is a Honeypot Everything you need to pass the Microsoft MTA 98-367 exam on your 1st attempt, includes 2 full-length practice exams!

Комментарии

Информация по комментариям в разработке