"All-in-One Is All You Need."
Get complete coverage of Security Essentials for all vendors Certification's inside this comprehensive course. This comprehensive Firewall course endeavors to deliver the extensive know-how of Check Point, Cisco, Juniper, Fortinet and Palo Alto. The Check Point Module explains to master the Security Gateway and Management Software Blades operation and configuration on GAiA. The Cisco Module demonstrates exploring ASA Core version One that facilitates ASA network security engineers to access core features of Cisco ASA. The Juniper module illustrates the practical implementation and configuration of security mechanisms, and troubleshooting. The Fortinet module focuses on the configuration and fundamental administration aspects. The Palo Alto Appliance will be described in-depth along with the configuration, installation, and administration of PAN-OS.
This Firewall certification is ideal for security personnel and networking professionals who are responsible for managing enterprise IT security and firewall protection.
• About Platforms and Architecture of each vendor firewall. • Network management approach and Initial configuration for each vendor firewall. • Various product comparison and Licensing Options. • To Identify and deploy security gateway in distributed environments for each vendor firewall. • Performing and scheduling, backup and restore of critical files. • Configuration of Interfaces and zones. • Configuration of NAT and Routing Features. • User management and Authentication locally and via terminal servers. • To Implement IPSec Site-to-site VPNs and SSL VPN Solutions. • Anti-virus (AV), anti-spam, Web and content filtering along with Unified Threat Management. • Distinctive vendor proprietory features for firewall administration.
• CCNA. • JNCIA-Junos. • Basic knowledge of networking. • Windows Server and/or UNIX skills. • Internet and TCP/IP experience.
How You Will Benefit
• Build, test and troublehoot numerous deployment scenarios. • Understand variation in architecture of different vendors. • Confidence to work in multi-vendor environment. • Broader understanding of cyber threats and mitigation techniques. • Ability to decide the best security solution for various environments. • Manage internal and external access to corporate resources.