0345 4506120

Firewall / VPN – Deployment and Implementation

This Firewall and VPN Deployment and Implementation training course is for those IT professionals who want to master network security. In our course they will learn the best firewall practices to safeguard their networks.

The training includes hands-on experience in installing and configuring some of the leading firewall products – from Check Point, Juniper, Microsoft and Cisco.


Learning Objectives

This course combines real-world experience with best-of-breed technologies to equip you with the skills to plan, design, implement and manage the firewall(s) protecting your network.


Who Should Attend?

IT professionals responsible for evaluating, planning, implementing or managing a secure network.

Course Content

Introduction to Information Security

Insecurity and the Internet
Threats and Attacks
Security Policies
Protecting Information Technology
Using SSL and Secure Shell
Testing your own security

Firewall Concepts

Defining a Firewall
Networking and Firewalls

DMZ Concepts, Layout and Conceptual Design

Introduction to DMZs
Types of DMZ
High Availability

Introduction to Intrusion Detection Systems

What is Intrusion Detection
Intrusion Detection Methods
Intrusion Detection Concerns

CheckPoint Firewall-1 NGX on Windows

Installing & Configuring Firewall-1 on a Windows Server Platform

Architecture and Installation
Security Policy Rule Base and Properties Set-up
Working With the Security Policy
Log Viewer and System Status
Network Address Translation
Protecting Your Installation with Backups
Tracking and Alerts
High Availability

Cisco ASA5505

The Adaptive Security Algorithm
Security Levels
Administrative Access Modes
Connecting the ASA
Command Line Configuration
Adaptive Security Device Manager
Configuring the ASA for Internet access

Juniper NetScreen

ScreenOS Concepts, Terminology, and Platforms
Initial Connectivity
Device Management
Layer 3 Operations
Basic Policy Configuration
Policy Options
Address Translation
Policy Based VPNs
Route Based VPNs

Microsoft Threat Management Gateway 2010

Installation and configuration

Check Point Safe @ Office

Installation and configuration

Virtual Private Networks

Technologies before VPNs
What is a VPN?
Secure VPNs
Cryptography Concepts
The IPSec Protocol
Key Management for IPSec
IPSec VPNs and PKI
Designing VPN Solutions
VPN Deployments with Firewall-1

Privacy Notice

In order to provide you with the service requested we will need to retain and use your contact information in accordance with our Privacy Notice. If you choose to provide us with this information you explicitly consent to us using the information as necessary to provide the request service to you. If you do not agree please do not proceed to request the service from us.

Marketing Permissions

Would you like to receive our newsletter and other information on products and services which we think will be of interest to you by email. We will always treat your information with care and in accordance with our Privacy Notice. You are free to withdraw this permission at any time.


Our Customers Include