NetworkEthics-Brochure
NetworkEthics-Brochure
Batch Starts
on
06 - Aug - 2024
Flexible Scheduling
Choose from weekday or weekend classes to
accommodate your professional
commitments.
PALO ALTO
#1 - Platforms and Architecture #5 - App-ID #11 - Site-to-Site VPN
Introduction to Palo Alto Networks App-ID Overview Site-to-Site VPN Overview
Next-Generation Firewall Overview Application Detection Methods Site-to-Site VPN Configuration
PAN-OS Overview Custom Applications Site-to-Site VPN Troubleshooting
Application Filters
#2 - Device Management #12 - Panorama
Initial Configuration (console access) #6 - User-ID Panorama Introduction
Register Palo Alto Firewall into PAN User-ID Overview Add Palo Alto Firewall into Panorama
customer portal AD-Integration Panorama Templates
Firewall update User Mapping Panorama Device Groups
Configuration file Types Group Mapping Panorama High Availability
Backup and Restore
Commit & Config locks #7 - Content-ID #13 - Troubleshooting
Admin users & Access management Content-ID Overview Tools and Resources
High Availability Antivirus Troubleshooting Methodology
(Active-passive, Active-Active) Anti-Spyware CLI Primer
Logging and Reporting Vulnerability Protection Flow Logic
Packet Captures
#3 - Interface Configuration/ #8 - URL Filtering Packet-Diagnostics Logs
Interface Deployment URL Filtering Overview Host-Inbound Traffic
Layer 3 Interfaces URL Filtering Profiles Transit Traffic
Layer 2 Interfaces URL Filtering Categories System Services
Virtual Wire Interfaces Support Escalation and RMAs
HA Interface #9 - Decryption
Tap Interface SSL Decryption Overview #14 - Exam Preparation
Decryption Policies Exam Overview
#4 - Security and NAT Policies Decryption Best Practices Exam Preparation Tips
Security Policy Overview Practice Exam Questions
Security Policy Configuration #10 - GlobalProtect
Network Address Translation (NAT) GlobalProtect Overview
GlobalProtect Infrastructure
GlobalProtect Agent
FORTIGATE
#1 - FortiGate Security Platform Overview #6 - Antivirus, Intrusion Prevention, #12 - SD-WAN
Introduction to firewall concepts and Application Control Introduction to SD-WAN and its benefits
Introduction to Fortinet and Security Fabric FortiGuard services overview Fortinet SD-WAN solution overview
FortiGate models and licensing IPS signatures and Antivirus profiles Implementing SD-WAN in FortiGate firewall
Initial setup and Fortinet-portal access Application control and filtering
#13 - VDOM Concepts and Configuration
#2 - FortiGate Device Management #7 - Web Filtering Introduction to Virtual Domains (VDOMs)
FortiGate device management concepts Web filtering concepts and URL filtering VDOM modes, types,
FortiGate CLI and GUI FortiGuard web filtering services and deployment scenarios
Admin account creation and Admin profiles Filtering HTTPS traffic VDOM configuration and management
Backup and Restore operations
#8 - Data Leak Prevention (DLP) #14 - Diagnostics and Troubleshooting
#3 - Firewall Policies DLP concepts and policy creation Packet flow and packet capture techniques
Firewall policy concepts and best practices Enforcing DLP policies and Diagnostic tools and troubleshooting
Creating & troubleshooting security policies managing incidents methodology
Policy validation techniques Log and report management
#9 - High Availability (HA)
#4 - Network Address Translation (NAT) HA concepts and configurations #15 - Exam Preparation
Types and configurations of NAT Active-Passive Exam overview and structure
Destination NAT (DNAT) and Active-Active HA setups Effective exam preparation tips
and Source NAT (SNAT) Practice exam questions and simulations
NAT troubleshooting techniques #10 - Routing with FortiGate Firewall
Static and default route configurations
#5 - Firewall Authentication Dynamic routing protocols
Authentication concepts and types
Configuring LDAP authentication #11 - VPN
Single Sign-On (SSO) with FSSO Site-to-Site VPN configurations
SSL VPN setup and management
CHECKPOINT
# 1 - Introduction to Check Point #4 - Security Policy Management #8 - VPN
Technology Understanding security policies IPSEC VPN
Introduction to firewall Creating and managing access control SSL VPN
Check Point Security Management rules
Architecture NAT and policy installation #9 - High Availability (Cluster XL)
Check Point Security Gateway Architecture SmartConsole and policy installation Active-Passive
Check Point SmartConsole Active-Active
#5 - Policy Layers
#2 - Lab Setup Overview of policy layers #10 - Monitoring and Reporting
Install EVE_NG Creating and managing sub-policies SmartEvent
Upload Image files Using threat prevention policies SmartReporter
Create LAB Using application control policies SmartView Tracker
ASDM overview and setup SSL VPN setup for remote access to
File transfer protocols (TFTP, FTP) corporate resources