0845 450 6120

Introduction to Firewalls

Audience

Anyone who needs to know and understand the workings of firewall technology, from a security or audit standpoint, should attend this course. If you come from one of these business areas, you would find the course very useful:

  • IT systems implementer wishing to protect vulnerable systems.
  • IT manager wishing to understand why the purchase of firewalling is necessary and what is involved.
  • Senior user or system owner wishing to understand ways of mitigating risk.
  • Network analyst looking to understand options for firewall protection.
  • Computer auditors and computer audit planners.
  • Computer security specialists.
  • Business risk analysts.

We don't currently have any courses listed for Introduction to Firewalls, would you like to view all courses for Information & Cyber Security?

Learning Objectives

This course will enable you to understand the workings of firewall technology, from a security or audit standpoint. The IT technical components will be explained to you, so you will understand how the various elements work together.

Pre-Requisites

Delegates should have a reasonable knowledge of IT in general. You should feel comfortable investigating system settings through a Windows GUI interface, as well as entering line commands in console environments. Some investigations may be carried out on a UNIX platform. The course has technical content, but this is technically in breadth, rather than depth.

Course Content

Introduction
What are we protecting ourselves against?
Which persons are the threat?
What do we have that anyone would wish to violate?

Communications Protocols Used on the Internet
TCP/IP mechanism
Ports and services
Network services
Intruder techniques
Port scanning and detection
TCP/IP based threats

Harvesting Information
What intruders are looking for
Tools of the trade
Attack signatures

Introducing Encryption
Business objectives
Types of encryption
Virtual private networks

Traffic Control
Firewalls
Application level filtering and proxy services

System Security Checks
Top IT-based vulnerabilities

Optional Topics
Checkpoint firewall audit
Firewall audit (general)

Privacy Notice

In order to provide you with the service requested we will need to retain and use your contact information in accordance with our Privacy Notice. If you choose to provide us with this information you explicitly consent to us using the information as necessary to provide the request service to you. If you do not agree please do not proceed to request the service from us.

Marketing Permissions

Would you like to receive our newsletter and other information on products and services which we think will be of interest to you by email. We will always treat your information with care and in accordance with our Privacy Notice. You are free to withdraw this permission at any time.

 

Our Customers Include