0845 450 6120

Firewall / VPN – Deployment and Implementation

This Firewall and VPN Deployment and Implementation training course is for those IT professionals who want to master network security. In our course they will learn the best firewall practices to safeguard their networks.

The training includes hands-on experience in installing and configuring some of the leading firewall products – from Check Point, Juniper, Microsoft and Cisco.

Reset

Learning Objectives

This course combines real-world experience with best-of-breed technologies to equip you with the skills to plan, design, implement and manage the firewall(s) protecting your network.

Pre-Requisites

Who Should Attend?

IT professionals responsible for evaluating, planning, implementing or managing a secure network.

Course Content

Introduction to Information Security

Insecurity and the Internet
Threats and Attacks
Security Policies
Protecting Information Technology
Using SSL and Secure Shell
Testing your own security

Firewall Concepts

Defining a Firewall
Networking and Firewalls

DMZ Concepts, Layout and Conceptual Design

Introduction to DMZs
Types of DMZ
High Availability

Introduction to Intrusion Detection Systems

What is Intrusion Detection
Intrusion Detection Methods
Intrusion Detection Concerns

CheckPoint Firewall-1 NGX on Windows

Installing & Configuring Firewall-1 on a Windows Server Platform

Architecture and Installation
Security Policy Rule Base and Properties Set-up
Working With the Security Policy
Log Viewer and System Status
Network Address Translation
Protecting Your Installation with Backups
Tracking and Alerts
High Availability

Cisco ASA5505

The Adaptive Security Algorithm
Security Levels
Administrative Access Modes
Connecting the ASA
Pre-Configuration
Command Line Configuration
Adaptive Security Device Manager
Configuring the ASA for Internet access

Juniper NetScreen

ScreenOS Concepts, Terminology, and Platforms
Initial Connectivity
Device Management
Layer 3 Operations
Basic Policy Configuration
Policy Options
Address Translation
Policy Based VPNs
Route Based VPNs

Microsoft Threat Management Gateway 2010

Installation and configuration

Check Point Safe @ Office

Installation and configuration

Virtual Private Networks

Technologies before VPNs
What is a VPN?
Secure VPNs
Cryptography Concepts
The IPSec Protocol
Key Management for IPSec
IPSec VPNs and PKI
Designing VPN Solutions
VPN Deployments with Firewall-1

One Month
Two Months
Three Months
More than Three Months
PRINCE2 Foundation & Practitioner
MSP Foundation & Practitioner
APMP Certificate
ITIL Foundation
Scrum in One Day
Certified ScrumMaster
ISTQB Software Test Foundation
Microsoft Project
BCS Business Analysis Practice
Other - Please Specify Below

Our Customers Include