25,000+ Courses Nationwide
0345 4506120

Introduction to Firewalls


This course is perfect for anyone who needs to know and understand the workings of firewall technology, from a security or audit standpoint. Delegates from one of the following business areas will find the course very useful:

  • IT systems implementer wishing to protect vulnerable systems.
  • IT manager wishing to understand why the purchase of firewalling is necessary and what is involved.
  • Senior user or system owner wishing to understand ways of mitigating risk.
  • Network analyst looking to understand options for firewall protection.
  • Computer auditors and computer audit planners.
  • Computer security specialists.
  • Business risk analysts.


3 days. Hands on.

Select specific date to see price, venue and full details.

Learning Objectives

This course will enable delegates to understand the workings of firewall technology, from a security or audit standpoint. The IT technical components will be explained in context, allowing delegates to see how the various elements work together.


Delegates should have a reasonable knowledge of IT in general.

Attendees should feel comfortable investigating system settings through a Windows GUI interface, as well as entering line commands in console environments. Some investigations may be carried out on a UNIX platform. The course has technical content, but focuses on breadth, rather than depth in one specific area.

Course Content

What are we protecting ourselves against?
Which persons are the threat?
What do we have that anyone would wish to violate?

Communications Protocols Used on the Internet
TCP/IP mechanism.
Ports and services.
Network services.
Intruder techniques.
Port scanning and detection.
TCP/IP based threats.

Harvesting Information
What intruders are looking for.
Tools of the trade.
Attack signatures.

Introducing Encryption
Business objectives.
Types of encryption.
Virtual private networks.

Traffic Control
Application level filtering and proxy services.

System Security Checks
Top IT-based vulnerabilities.

Optional Topics
Checkpoint firewall audit.
Firewall audit (general).

Related Courses

Privacy Notice

In order to provide you with the service requested we will need to retain and use your contact information in accordance with our Privacy Notice. If you choose to provide us with this information you explicitly consent to us using the information as necessary to provide the requested service to you. If you do not agree please do not proceed to request the service from us.

Marketing Permissions

Would you like to receive our newsletter and other information on products and services which we think will be of interest to you by email. We will always treat your information with care and in accordance with our Privacy Notice. You are free to withdraw this permission at any time.


We work with the best