What is a Honeypot
A free video tutorial from Alton Teaches LLC
Start Learning IT Today to Advance Your Career
19 courses
224,190 students
Learn more from the full course
Microsoft Security Fundamentals
Learn Windows Security: Windows Hardening, Firewalls, NTFS Permissions, Active Directory, AppLocker, BitLocker and More
13:05:12 of on-demand video • Updated January 2026
Build a basic Windows security lab environment with VirtualBox, Windows Server 2016, and Active Directory to follow along with demonstrations
Understand BitLocker and BitLocker To Go encryption through hands-on demonstrations
Learn about AppLocker and Software Restriction Policies and see them configured in live demonstrations
Understand NTFS permissions, share permissions, inheritance, and effective access through guided demonstrations
Learn Active Directory security fundamentals including groups, organizational units, delegation, and basic Group Policy configuration
Understand Windows password policies, account lockout policies, and audit policies through demonstrations
Learn about Windows Encrypting File System (EFS) and see encryption concepts demonstrated
Understand Windows Firewall configuration and the difference between hardware and software firewalls
Learn about network isolation techniques including VPNs, IPSec, VLANs, and perimeter networks
Understand Windows hardening using User Account Control (UAC), Windows Defender, and security best practices
Learn about RADIUS authentication through live demonstrations
Understand the Windows Registry and its role in system security
See DNSSec and secure dynamic DNS updates demonstrated on Windows Server
Learn to analyze network traffic with Wireshark to understand protocol security and common attacks
Understand encryption fundamentals including symmetric, asymmetric, hashing, and digital certificates
English [Auto]
In this video, we're going to talk about honeypot. So what is a honeypot? Well, here's a diagram of a honeypot. What it is, is that a honeypot is a decoy server or multiple servers, and they're typically placed in a DMZ, which we see down here. We have our firewall, we have our DMZ over here with a honeypot in it, and then our internal network protected on a different interface on the firewall. And the whole purpose of these honey pots being in a DMZ is they're designed to entice malicious users, meaning hackers to attack them rather than our internal network. And so how does this work? Well, they're set up to look just like live production servers. However, the I.T personnel are going to poorly configure them to make them much easier to exploit than our actual production servers. So they're more enticing to attack, they're easier to get into, they're easier to exploit. So why do we use a honeypot? Well, they serve a twofold purpose. The first one, of course, makes sense and it's kind of straightforward is a lure that the hackers away from our real network. So we would much rather have them attack our honeypot than our real production internal network. The second thing is that honeypots allow our i.t personnel to observe and learn how hackers are attacking our system. So we get to learn their methodologies for how they're exploiting weaknesses and vulnerabilities within our systems so we can better secure them. So that's a honeypot. And like I said, they're typically set up within a DMZ that can be an actual physical server. They could be multiple servers, they could be multiple servers that are virtualized within a single physical server. The way in which they're set up is really just going to be dependent upon the organization. But like I said, they're typically set up in their own DMZ off on a different interface on our firewall. And in regards to the role that they play in network isolation, well, they play a role in isolating or at least enticing the attackers to their own isolated portion of the network rather than our internal network. So that's going to conclude our short introduction and overview into Honeypot. So if you have any questions, please let me know. If not, thanks for watching and I'll see you at the next video.