Introduction
This Combo of comprehensive Firewall expert courses endeavors to deliver the extensive know-how of Check point, Fortigate, Cyberoam.
Prerequisites :Knowledge of Computer Hardware, Network and Server Administration.
Course Duration:1 & ½ Month
Batch Time: 1) 8:00 am to 9:30 am 2) 7:30 to 9:00 p.m 3) Weekend SAT/SUN
Why INFOBIT :
Since 1999 Infobit Technologies is a leader in the high end
Latest technologies IT education industry and ITES . Organizations continue to upgrade, standardize and integrate their systems to develop and sustain their competitive edge.
- Industrial Experienced Faculty
- Certified Trainer
- Totally Practical Training on LAB
- Dedicated Lab Facility (10 AM to 7 PM )
- Week End Batch for the JOB Professional
Check Point Overview
1. Welcome to CCSAc
2. Check Point Fundamentals
3. Installing GAiA
4. Linking the Manager & Firewall
5. Pushing Policy
6. NAT
7. Policy Packages & Database Versions
8. SmartView Tracker
9. SmartView Monitor
10. LDAP
11. Identity Awareness
12. App Control and URL Filtering
13. HTTPS Inspection
14. CLI
15. IPsec VPNs (Site to Site)
16. Backup and Recovery
17. Smart Update
18. Additional Check Point Features
19. CCSA Exam Success
Fortigate firewall
fortigate 1: Objectives
After completing these courses, you will be able to:
-Describe capabilities of FortiGate UTM
-Neutralize threats / misuse: viruses, torrents, and inappropriate web sites
-Control network access based on device type
-Authenticate users via firewall policies
-Offer an SSL VPN for secure access to your private network
-Establish an IPsec VPN tunnel between two FortiGate appliances
-Compare policy- vs. tunnel-based IPsec VPN
-Apply port forwarding, source NAT, and destination NAT
-Interpret log entries
-Generate reports
-Use the GUI and CLI for administration
-Deploy the right operation mode
-Deploy an explicit proxy with firewall policies, authentication, and caching
-Simplify protocol handling with application control
fortigate 2: Objectives
After completing these couses, you will be able to:
-Deploy FortiGate devices as an HA cluster for fault-tolerance & high performance
-Inspect traffic transparently, forwarding as a Layer 2 device
-Manage FortiGate device's route table
-Route packets using policy-based and static routes for multi-path and load-balance deployments
-Connect virtual domains (VDOMs) without packets leaving FortiGate
-Implement a meshed / partially redundant VPN
-Diagnose failed IKE exchanges
-Fight hacking & denial of service (DoS)
-Diagnose IPS engine performance issues
-Offer Fortinet Single Sign On (FSSO) access to network services, integrated with Microsoft Active Directory
-Inspect SSL/TLS-secured traffic to prevent encryption used to bypass security policies
-Understand encryption functions and certificates
-Defend against data leaks by identifying files with sensitive data, and blocking them from leaving your private network
-Diagnose and correct common problems
-Optimize performance by configuring to leverage ASIC acceleration chips, such as CP or NPs, instead of only the CPU resources
-Implement IPv6 and hybrid IPv4-IPv6 networks
Cyberoam
Module 1: Cyberoam Product Overview
-Cyberoam UTM overview
-Cyberoam Central Console Overview
-Cyberoam on-cloud management overview
-Cyberoam iView Overview
Module 2: Deploying Cyberoam
-Prerequisites for deployment
-Network Diagrams & Scenarios
-Deployment Scenarios
-(Transparent/Gateway/Mixed) Mode
-Failure of Security Device & It's Consequences
-Proxy Scenarios
-Managing connectivity with multiple ISPs
-Manage 3G and Wi-Max connections Labs
Module 3: Firewall
-How to Control Access
-Managing the Firewall
-Identifying Each Machine on the network
-NAT
-DoS (Denial of Service)
-Fusion Technology based Unified Control
-Firewall - as a single solution to identity,Security, connectivity, productivity, and Logging Labs
Module 4: User Authentication
-Types of Authentication(Single Sign On, Local, and External)
-Group Authentication
-Traffic Discovery
-Authenticating from Servers(AD, LDAP, or RADIUS)Labs
Module 5: Web Filter
-Filtering with Keywords
-Filtering with URL
-Filtering by Categories
-Filtering Web Traffic Labs
Module 6: Application Firewall
-Application & P2P Filtering
-Instant Messaging Filters
-Custom Filters
-Compliance based filtering Labs
Module 7: Network Threat Protection
-Web/Mail/FTP Anti-Virus
-Gateway level Anti-Virus/Anti-Spam
-Instant Messaging Anti-Virus
-Virus Outbreak Detection
-Recurrent Pattern Detection
-RBL (Realtime Black List), IP Reputation
-Signature based detection
-Statistical anomaly based detection
-Stateful protocol analysis detection
-Network Based IPS (NIPS) & Wireless Based IPS (WIPS)
-Network Behaviour Analysis (NBA)
-Host Based IPS (HIPS)
-WAF
-Labs
Module 8: VPN
-Threat Free Tunneling
-VPN Bandwidth Management
-VPN Failover
-Identity based authentication in VPN
-Labs
Module 9: QoS
-Traffic Queuing
-Traffic Prioritisation
-Bandwidth Allocation
-Scheduling and sharing bandwidth
-Guaranteed bandwidth
-QoS implementation on user, group, firewall,Application, web category.
-Labs
Module 10: Network High Availability
-High Availability, LAN Failsafe?
-Clustering of devices
-What is link load balancing?
-Why undertake balancing?
-Link fails scenario
-Why failover?
-Multilink Manager
-Load balancing
-Active load balancing and gateway Failover
-Active Passive configuration and gateway Failover
-MPLS failover to VPN
-Automatic ISP failover detection
-Labs
Module 11: General Administration
-Setup Logging
-DNS Management
-DHCP Management
-Upgrading Device Firmware
-Backing Up
-Restoring
-Diagnostic Tools
-Troubleshooting Tools
Module 12: Logging & Reporting
-Labs to provide hands on to deal with maintenance
-Types of Reports
-Data Management
-Report Management
-Compliance reports
-Searching within reports
-Identity based reporting