0% found this document useful (0 votes)
11 views8 pages

NetworkEthics-Brochure

The document outlines a 5-in-1 Firewall Mastery Training Program starting on August 6, 2024, aimed at IT professionals looking to enhance their skills in various firewall technologies including Palo Alto, Fortinet, Check Point, Cisco Firepower, and Cisco ASA. The program offers expert-led instruction, hands-on labs, and certification preparation to help participants advance their careers in cybersecurity. It emphasizes practical learning and flexibility with options for weekday or weekend classes, along with access to recorded sessions.

Uploaded by

dianacathy377
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
11 views8 pages

NetworkEthics-Brochure

The document outlines a 5-in-1 Firewall Mastery Training Program starting on August 6, 2024, aimed at IT professionals looking to enhance their skills in various firewall technologies including Palo Alto, Fortinet, Check Point, Cisco Firepower, and Cisco ASA. The program offers expert-led instruction, hands-on labs, and certification preparation to help participants advance their careers in cybersecurity. It emphasizes practical learning and flexibility with options for weekday or weekend classes, along with access to recorded sessions.

Uploaded by

dianacathy377
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 8

NETWORK ETHICS

Empower your cyber security carrier

Batch Starts
on
06 - Aug - 2024

Welcome to our exclusive 5-in-1 Firewall


Mastery Training Program, designed for
IT professionals seeking comprehensive
expertise in leading firewall technologies. BOOK YOUR
This intensive program covers Palo Alto SLOT NOW
Networks, Fortinet FortiGate, Check Point,
Cisco Firepower, and Cisco ASA Firewall,
+91 95978 18863
equipping you with essential skills in
installation, configuration, management,
and advanced cybersecurity practices. [email protected]
Gain hands-on experience in simulated
environments, guided by certified
instructors with extensive industry
knowledge.
BENEFITS OF LEARNING MULTI-VENDOR
COURSE HIGHLIGHTS
FIREWALL TECHNOLOGIES

Expert-LED Instruction Career Advancement


Learn from seasoned instructors with in- Develop expertise in multiple firewall
depth experience across multiple firewall technologies, enhancing your attractiveness
platforms. to employers and opening doors to
advanced career opportunities
Comprehensive Curriculum
Covering foundational to advanced topics Skill Diversification
tailored to each firewall technology. Gain proficiency beyond a single vendor,
enabling you to tackle diverse cyber security

Hands-On Labs challenges and projects with confidence.

Practice configuring firewalls in realistic


scenarios to reinforce learning. Professional Growth
Expand your knowledge base in network
security, bolstering your resume and
Recorded Sessions
increasing your value in the job market.
Access video recordings for each module,
enhancing flexibility and review opportunities.
Hands-On Experience
Practice with real-world scenarios and labs,
Certification Preparation
gaining practical skills that are immediately
Prepare for industry-recognized certifications
applicable in your role.
including Palo Alto Networks PCNSA/PCNSE,
Fortinet NSE4, Check Point CCSA/CCSE, Cisco
CCNP Security.

Flexible Scheduling
Choose from weekday or weekend classes to
accommodate your professional
commitments.
PALO ALTO
#1 - Platforms and Architecture #5 - App-ID #11 - Site-to-Site VPN
Introduction to Palo Alto Networks App-ID Overview Site-to-Site VPN Overview
Next-Generation Firewall Overview Application Detection Methods Site-to-Site VPN Configuration
PAN-OS Overview Custom Applications Site-to-Site VPN Troubleshooting
Application Filters
#2 - Device Management #12 - Panorama
Initial Configuration (console access) #6 - User-ID Panorama Introduction
Register Palo Alto Firewall into PAN User-ID Overview Add Palo Alto Firewall into Panorama
customer portal AD-Integration Panorama Templates
Firewall update User Mapping Panorama Device Groups
Configuration file Types Group Mapping Panorama High Availability
Backup and Restore
Commit & Config locks #7 - Content-ID #13 - Troubleshooting
Admin users & Access management Content-ID Overview Tools and Resources
High Availability Antivirus Troubleshooting Methodology
(Active-passive, Active-Active) Anti-Spyware CLI Primer
Logging and Reporting Vulnerability Protection Flow Logic
Packet Captures
#3 - Interface Configuration/ #8 - URL Filtering Packet-Diagnostics Logs
Interface Deployment URL Filtering Overview Host-Inbound Traffic
Layer 3 Interfaces URL Filtering Profiles Transit Traffic
Layer 2 Interfaces URL Filtering Categories System Services
Virtual Wire Interfaces Support Escalation and RMAs
HA Interface #9 - Decryption
Tap Interface SSL Decryption Overview #14 - Exam Preparation
Decryption Policies Exam Overview
#4 - Security and NAT Policies Decryption Best Practices Exam Preparation Tips
Security Policy Overview Practice Exam Questions
Security Policy Configuration #10 - GlobalProtect
Network Address Translation (NAT) GlobalProtect Overview
GlobalProtect Infrastructure
GlobalProtect Agent
FORTIGATE
#1 - FortiGate Security Platform Overview #6 - Antivirus, Intrusion Prevention, #12 - SD-WAN
Introduction to firewall concepts and Application Control Introduction to SD-WAN and its benefits
Introduction to Fortinet and Security Fabric FortiGuard services overview Fortinet SD-WAN solution overview
FortiGate models and licensing IPS signatures and Antivirus profiles Implementing SD-WAN in FortiGate firewall
Initial setup and Fortinet-portal access Application control and filtering
#13 - VDOM Concepts and Configuration
#2 - FortiGate Device Management #7 - Web Filtering Introduction to Virtual Domains (VDOMs)
FortiGate device management concepts Web filtering concepts and URL filtering VDOM modes, types,
FortiGate CLI and GUI FortiGuard web filtering services and deployment scenarios
Admin account creation and Admin profiles Filtering HTTPS traffic VDOM configuration and management
Backup and Restore operations
#8 - Data Leak Prevention (DLP) #14 - Diagnostics and Troubleshooting
#3 - Firewall Policies DLP concepts and policy creation Packet flow and packet capture techniques
Firewall policy concepts and best practices Enforcing DLP policies and Diagnostic tools and troubleshooting
Creating & troubleshooting security policies managing incidents methodology
Policy validation techniques Log and report management
#9 - High Availability (HA)
#4 - Network Address Translation (NAT) HA concepts and configurations #15 - Exam Preparation
Types and configurations of NAT Active-Passive Exam overview and structure
Destination NAT (DNAT) and Active-Active HA setups Effective exam preparation tips
and Source NAT (SNAT) Practice exam questions and simulations
NAT troubleshooting techniques #10 - Routing with FortiGate Firewall
Static and default route configurations
#5 - Firewall Authentication Dynamic routing protocols
Authentication concepts and types
Configuring LDAP authentication #11 - VPN
Single Sign-On (SSO) with FSSO Site-to-Site VPN configurations
SSL VPN setup and management
CHECKPOINT
# 1 - Introduction to Check Point #4 - Security Policy Management #8 - VPN
Technology Understanding security policies IPSEC VPN
Introduction to firewall Creating and managing access control SSL VPN
Check Point Security Management rules
Architecture NAT and policy installation #9 - High Availability (Cluster XL)
Check Point Security Gateway Architecture SmartConsole and policy installation Active-Passive
Check Point SmartConsole Active-Active
#5 - Policy Layers
#2 - Lab Setup Overview of policy layers #10 - Monitoring and Reporting
Install EVE_NG Creating and managing sub-policies SmartEvent
Upload Image files Using threat prevention policies SmartReporter
Create LAB Using application control policies SmartView Tracker

#3 - Initial Configuration #6 - Network Address Translation #11 - Troubleshooting


Security Manager Overview and Installation (NAT) Using debugging tools
Security Manager Initial Configuration Overview of NAT Packet captures for troubleshooting
Security Gateway Overview and Installation Static NAT, System logs and event analysis for
Security Gateway Initial Configuration Hide NAT, troubleshooting
Introduction to SmartConsole Dynamic NAT Packet flow of checkpoint
Installing SmartConsole Troubleshooting NAT Troubleshooting approach
Adding a Gateway to the Security
Management Server #7 - Advanced Firewall Features
Static and Default Routes URL Filtering
SmartUpdate and Licensing Application Control
Backup Anti-Virus and Anti-Spam
Snapshots File blocking
Restore IPS
Identity Awareness
CISCO ASA
#1 - Introduction to Firewall Technologies #7 - Network Address Translation #12 - Packet Capture and Analysis
Firewall concepts and types (NAT) in Cisco ASA Capturing packets for troubleshooting
Importance of network security NAT and PAT concepts network issues
Static NAT Analyzing captured packets to identify
#2 - About Cisco ASA Firewall Dynamic NAT and resolve security concerns
Overview of Cisco ASA firewall capabilities Static PAT
Evolution and benefits of Cisco ASA Dynamic PAT #13 - Troubleshooting Cisco ASA Firewall
Troubleshooting common issues related
#8 - Transparent Firewall
#3 - Install Cisco ASAv Firewall on EVE-NG to configuration, connectivity, and
Transparent firewall configuration security policies
Setting up the lab environment
and considerations Using diagnostic tools and logs for
Installing Cisco ASAv on EVE-NG
Benefits and use cases of deploying a efficient problem resolution
transparent firewall
#4 - Cisco ASA Firewall Basic
Configuration Commands #9 - High Availability (HA) and
Basic command line interface (CLI) Failover
commands HA setup and configuration
Initial setup and configuration Active/Standby failover
Active/Active failover
#5 - Device Management
Console management and configuration #10 - VPN Configuration
Remote management protocols IPsec VPN setup for secure site-to-site

(Telnet, SSH) communications

ASDM overview and setup SSL VPN setup for remote access to
File transfer protocols (TFTP, FTP) corporate resources

#6 - Access Control Lists (ACLs) #11 - Syslog Logging and Monitoring


Standard ACLs Setting up syslog logging to track
Extended ACLs firewall events
Time-Based ACL Monitoring firewall performance and
Object Groups ACL security incidents
CISCO FTD
#1 - Introduction to Cisco Firepower #5 - Network Security #9 - Firepower High Availability
Overview of Cisco Firepower Threat Defense Overview of network security concepts Overview of Firepower's high
(FTD) solution Access control policies availability features
Features and benefits of Cisco Firepower Network Address Translation (NAT) Device clustering
Deployment options for Cisco Firepower Dynamic Host Configuration Protocol Stateful failover
(DHCP) Load balancing
#2 - Firepower Management Center (FMC)
Introduction to the Firepower Management #6 - Firepower Application Visibility #10 - Firepower Platform
Center (FMC) and Control (AVC) Troubleshooting
Device registration, configuration, and Overview of Firepower's Application Troubleshooting common issues
management Visibility and Control (AVC) features in Firepower
System configuration and administration Identifying applications Connectivity issues
User and role management Controlling application use Performance issues
Configuration issues
#3 - Firepower Device Management #7 - Firepower Intrusion Prevention
Introduction to Firepower device System (IPS)
management Overview of Firepower's Intrusion
Device registration and licensing Prevention System (IPS)
Software upgrades and updates Configuration of intrusion policies
Advanced Malware Protection (AMP)
#4 - Firepower Policy Configuration File policies
Overview of policy configuration in Correlation policies
Firepower
Network access policies #8 - Firepower VPN Configuration
Identity policies Overview of VPN concepts
Threat policies Site-to-Site VPN
Correlation policies Remote Access VPN
Security Intelligence policies AnyConnect VPN
Application Control policies
Who Should Attend: Course Details
Network Administrators Duration
Security Engineers Palo Alto – 50 hrs
IT Professionals managing network security Fortigate - 40 hrs
System Administrators Checkpoint - 30 hrs
IT Managers CISCO ASA - 30 hrs
Cyber Security Analysts Cisco FTD - 40 hrs
Professionals seeking career advancement in network security and
cyber security domains Training Mode : Instructor lead live
training program ( Online )
Why Choose Us:
Medium : Zoom
Industry-Recognized Training
Gain skills aligned with industry standards and best practices. Batch Starts From : 05 - Aug - 2024
Practical Learning Approach
Hands-on labs and real-world scenarios prepare you for practical challenges.
Career Advancement
Enhance your resume with certifications and skills highly sought after by employers.
Supportive Learning Environment
Access to recorded sessions and expert guidance throughout your learning journey.

For more information and to secure your spot in our exclusive


5-in-1 Firewall Mastery Training Program,
Contact us:
Phone : + 91 95978 18863
Email : [email protected]
Website : https://networkethics.net/

You might also like