Booking options
£1,727
£1,727
Delivered Online or In-Person
You travel to organiser or they travel to you
Redhill
Two days
All levels
A technical hands on training course covering firewall technologies. This focuses on the whys and hows of firewall technology rather than looking at manufacturer specific issues.
What will you learn
Design secure firewall protected networks.
Test firewalls.
Evaluate firewalls
Configure firewalls
Firewalls training course details
Who will benefit:
Technical staff wanting to learn about Filrewalls including:
Technical network staff.
Technical security staff.
Prerequisites:
IP security foundation for engineers
Duration
2 days
Firewall introduction
Security review, what is a firewall? What do
firewalls do? Firewall benefits, concepts.
Hands on
Configuring the network to be used in later labs,
launching various attacks on a target.
Firewall types
Packet filtering, SPI, Proxy, Personal. Software
firewalls, hardware firewalls, blade based firewalls,
personal firewalls, which firewall should you use?
Firewall products.
Hands on Configuring a simple
firewall.
Packet filtering firewalls
Things to filter in the IP header, stateless vs.
stateful filtering. ACLs. Advantages of packet
filtering.
Hands on Configuring packet filtering
firewalls.
Stateful packet filtering
Stateful algorithms, packet-by-packet inspection,
application content filtering, tracks, special
handling (fragments, IP options), sessions with
TCP and UDP. Firewall hacking detection: SYN
attacks, SSL, SSH interception.
Hands on Stateful
packet inspection firewalls.
Proxy firewalls
Circuit level, application level, SOCKS. Proxy
firewall advantages and disadvantages.
Hands on
Proxy firewalls.
Personal firewalls
The role of personal firewalls, Windows XP,
Zonealarm.
Hands on Configuring a personal
firewall.
Firewall architectures
Home based, small office, enterprise, service
provider, what is a DMZ? DMZ architectures,
bastion hosts, multi DMZ. Virtual firewalls,
transparent firewalls. Dual firewall design, high
availability, load balancing, VRRP.
Hands on
Resilient firewall architecture.
Securing communications
VPNs, IPsec. Firewall configuration of VPNs,
integration of dedicated VPN devices and
firewalls.
Hands on IPSec VPN configuration.
Testing firewalls
Configuration checklist, testing procedure,
monitoring firewalls, logging, syslog.
Hands on
Testing firewalls.