This Lesson discusses some of the methods that hackers use to circumvent firewalls.
Upon completion of this Lesson, you will be able to:
- list some of the methods hackers use to identify which firewall a network is using.
- identify some of the methods hackers use to gather information through firewalls.
- discuss the impact a firewall can have on network performance.