Video Description

Capturing methods This lesson discusses capturing methods. Capturing methods are ways of detecting and analyzing suspicious activity. Two capturing methods are honey pots and honey nets. A honey pot is an intentionally vulnerable machine in order to lure an attacker and try to goad them into attacking that machine. A honeypot is useful if the prospective attacker does not figure out it is a honeypot. A honey net is an entire network of honey pots. Honey pots are more intricate as well as more convincing at looking at a large enterprise for a would-be attacker.

Course Modules

CompTIA Network+

Instructed By

Instructor Profile Image
Admin Anthony

System Analyst and Administrator at SAIC



Subscribe to become an Insider Pro and get access to premium content such as:

Unlimited access to 700+ apps, including virtual labs, practice tests, capture-the-flag challenges, and more
Industry certification preparation
Guided Mentor
Premium support