![](https://ccweb.imgix.net/https%3A%2F%2Fwww.classcentral.com%2Fimages%2Ficon-black-friday.png?auto=format&ixlib=php-4.1.0&s=fe56b83c82babb2f8fce47a2aed2f85d)
Overview
![](https://ccweb.imgix.net/https%3A%2F%2Fwww.classcentral.com%2Fimages%2Ficon-black-friday.png?auto=format&ixlib=php-4.1.0&s=fe56b83c82babb2f8fce47a2aed2f85d)
The course aims to teach learners how to automatically discover evasion vulnerabilities using targeted protocol fuzzing. The learning outcomes include understanding the basis of traffic inspection, detecting evasive attacks, and testing traffic inspection. The course covers skills such as testing for evasion vulnerabilities, recording successful attacks, and eliminating pulses. The teaching method involves a presentation with a focus on practical demonstrations. The intended audience for this course includes cybersecurity professionals, network engineers, and individuals interested in vulnerability testing and network security.
Syllabus
Introduction
Title
What is an evasion
Why do we do this
How do you detect evasive attacks
Why do we have evasive vulnerabilities
Why we have evasive vulnerabilities
Evasion Aware
Test Traffic Inspection
How to Test
Mong Bath
Recording Successful Attacks
Results
Pulse Elimination
Challenges
Key Findings
Availability
Demo
Recommended Policies
Multiple Firewalls
Future Updates
Taught by
Black Hat