This Lesson discusses some of the methods that hackers use to circumvent firewalls.

Upon completion of this Lesson, you will be able to:

  • list some of the methods hackers use to identify which firewall a network is using.
  • identify some of the methods hackers use to gather information through firewalls.
  • discuss the impact a firewall can have on network performance.