Trika Firewall Maestr 1 Trika Systems
Intrductin Firewall is essential design element fr enterprise and datacenter security requirements. Organizatins are using firewall and ther security technlgies t secure their perimeter and business critical assets. Ever changing and dynamic businesss requirement s has ensued cmplex business interactins hence security has becme f paramunt interest and tpmst pririty fr rganizatins t secure the digital infrmatin. Firewalls with next generatin functinalities and ther advance security features prevents sphisticated attacks and ensure authrized access t sensitive infrmatin. TFM has been designed by industry skilled prfessinals keeping current rganizatin requirements under cnsideratin. Multi-vendr skills with understanding n next generatin technlgies applicatin identificatin, threat preventin- has becme key attribute t success f any firewall training prgram tday. This multi-vendr curse helps prfessinals t understand design aspects f firewall, VPN and threat preventin technlgies with hands-n experience n hw t design, cnfigure and trublesht firewalls, NAT, VPN technlgies alng with threat preventin strategies t cmbat advance sphisticated threats. Prerequisites: CCNA r equivalent certificatin is desired t attend this curse Technlgies cvered Checkpint firewall, Pal Alt next generatin firewall, Wireshark & kali linux Take away: After cmpletin f this curse student will attain understanding n netwrk and security technlgies including 2 Expsure t multi vendr technlgies such ass Checkpint, Palalt, kali linux and ther trubleshting tls Security basics, firewall & ther security technlgies Packet filter firewall Applicatin gateway firewalll Stateful Inspectin Next generatin firewall Intrusin preventin systems Understandd and design requirement fr enterprise security architecture. Stateful and next gen firewall architecture with detailed packet flw. Understanding firewall security plicy mdels and attributes. Requirement f netwrk address translatin Security plicies enfrcement with applicatin identificatinn in next generatin firewall Trika Systems
User based plicy enfrcement Next generatin threat preventin Intrusin preventin systems Web filtering Gateway AV VPN technlgies SSL VPN IPsec VPN Designing perimeter with Active-Active and Active-backup cluster Trubleshting firewall with debugs, packet captures, traffic and audit lgs Curse cntent Mdule 1 Firewall Architecture 3 Understanding varius firewall technlgies likes f : Packet filter firewall Applicatin gateway firewalll Stateful Inspectin Next generatin firewall Enterprise security architecture defense in depth / layered security architecture Understanding n 3-tier architecturee Security Gateway/Firewall Security Management Smart Cnsle tls Details abut Hardware & flw architecture f next generatin firewall Single pass architecture Flw lgic Segregated cntrl plane and data planee Hardware architecture Fast path Design cnsideratin with firewall security slutin Detailed Packet flw with Stateful & next generatin firewall Trika Systems
Mdule2 Netwrk Address Translatin Overview n NAT requirements Netwrk address translatin Surce NAT Destinatin NAT Static NAT Dual NAT Persistence NAT, Full cn & Half cn NAT Design cnsideratin while using autmatic andd manual NAT NAT Specific traffic flw Overlapping netwrk cmmunicatin using NAT Applicatins affected by NAT Understanding and implementatinn f NAT plicies Mdule 3 Applicatin identificatin 4 Overview f applicatin identificatin Varius cmpnent & technlgies f applicatin identificatin prcesss Applicatin-ID traffic flw Overview f security plicy App-id and security plicies cnfiguratin Advance cncepts n applicatin and security plicies Applicatin dependencies Managing plicy behavir Custm applicatin signatures Lgging and reprting Overview f SSL sessin setup and underrating f PKI cnfigure firewall fr SSL visibility inbund deep packet inspectin f SSL traffic - IPS and ther signatures fr inbund SSL traffic Mdule 4 User based plicies / identity awarenes Overview and understanding n user-id User-id flw & user based plicies understanding n user-id prcess Trika Systems
Enumerate users and grup with Active directry and LDAP User id agent identificatin methd Captive prtal verview fr guest authenticatinn Mdule 5 Threat preventin Overview f threat preventin mdules and security prfiles Understanding n advance deep packet inspectin using Anti-virus prfiles Anti-spyware prfiles Vulnerability scanning prfiles Url filtering prfiles File blcking prfiles Administratin f security prfiles Zne prtectin prfiles Mdule 6 VPN Overview f VPN technlgies SSL VPN IPsec VPN Understanding n plicy based vpn and its limitatins Rute based VPN Implementing VPN with dynamic ruting n firewall Understanding n NAT-T f mbility requirements and SSL VPN in IPSEC VPN Advance understanding technlgy Netwrk mde, applicatin mde, thin client Split tunneling, full tunneling End pint security Mdule 7 High Availability Understanding active-active and active-standbyy cluster 5 High Availability, lad sharing, lad balancing Unicast mde Multicast mde Cncept f Magic MAC Understanding and managing split brain cnditin Trika Systems
Mdule 8 Trubleshting Overview f trubleshting methdlgy n firewalls Trubleshting f address spfing issues Trubleshting security plicies and NAT Checkpint tls VPN debugging using VPN tls Debugging and maintaining SIC Diagnsing Cluster & lggingg issues Packet level trubleshting with TCPDUMP Trubleshting using pcap files verview f wireshark tl path and link mnitring cnfiguratin t handle failver cnditins Mdule 9 centralized manageme ent server verview and Deplyment Intrductinn t centralized management Benefits fr using centralized management server in netwrk infrastructure Overview f MDM and Panrama architecture Mdule 10 Threat Management/ Preventin 6 Overview f KALI t Launch Netwrk and applicatin based attacks Understanding n Ft printing and Recnnaissance using KALI Hacking web applicatin using SQL injectin Understanding n Denial f Service attacks Overview f cyber security best practices File Blcking best practices Use f Kali t launch attacks URL filtering best practices Vulnerability Prtectin best practices Traps best practices Understanding n reducing attack surface Overview n investigating attacks Indicatrs f Cmprmise Lgs and Reprts Lg Crrelatin Trika Systems
Mdule 11 Intrductin t Ethical Hackingg Cyber security verview & threat landscape Tp infrmatin security attack vectrs Understanding threat vectrs Operating systems attacks Applicatin riented attacks Netwrk level threats Attack lifecycle and phases f attacks Attackers mtives Essential terminlgies Mdule 12 Intrductin t Kali Linux Setup virtual envirnment fr Kali Linux and target virtual machines Overview f Linux cmmand line Directry structure File permissinss User privileges Prcess and services Cnfiguringg Netwrking services n Kali including web server, DNS server etc.. Managing packages Netcat - The Swiss Army Knife f TCP/IPP Cnnectins 7 Trika Systems
Stay Ahead f the curve 8 Trika Systems