Customized Contents for Security Track Palo-Alto I Juniper
VPN
Introduction to VPN Technology
IPSEC Technology in detail
IPSEC IKE Version 1
IPSEC IKE Version 2
IPSEC ESP Protocol
IPSEC AH Protocol
Site-to-Site IPSEC VPN Using Tunnel
Site-to-Site IPSEC VPN Over GRE
SSL Protocol in Detail
SSH 7-Way Handshake
SSL VPN Configuration on firewall – Clientless
SSL VPN Configuration on firewall – with Client
Troubleshooting to IPSEC VPN
Troubleshooting of SSL VPN
AAA
Introduction to AAA
AAA using local Database.
AAA using LDAP/AD
Firewall Integrations with AD/LDAP
Firewall rules using group/users from AD/LDAP
RADIUS protocol in detail
Integrations with RADIUS Server
Authentication using RADIUS Server
Policy based authentication using RADIUS Server
Firewall & Firewall Features:
Stateful vs Stateless inspection
Packet flow on firewall
Packet processing on firewall
Rule processing on firewall
Different modules of firewall
Different type NAT on Firewall
Packet Inspection on Firewall
DOS/DDOS Attack prevention
IPS/IDS Functionality on firewall
Vulnerability management on firewall
Vulnerability mitigation
Vulnerability identification
Network scanning using different tools.
Port scanning using different tools.
Forward proxy architecture
Reverse proxy architecture
Full proxy architecture
Half proxy architecture
Penetration testing using different tools.
Malware Analysis
Attack analysis
Threat analysis
BOT analysis
Worms/Viruses Analysis
Firewall Clustering
Packet Capture on Firewall
Packet capture analysis
F5 Load Balancer
Understanding of different load balancing mechanism
Pools
Pool Members
Different type of pools
F5 Clustering
TCP inspection on Load balancer
Understanding on VIP on load balancer.
Course Features
- Lectures 24
- Quizzes 0
- Duration 45 hours
- Skill level All levels
- Language English
- Students 2
- Assessments Yes
Curriculum
- 1 Section
- 24 Lessons
- 45 Hours
- Session 124
- 1.0Table Of Content
- 1.1Study Material Documents
- 1.2Extra Study Material: Penetrating Testing & AAA
- 1.3Study Material Video For HA58 Minutes
- 1.4Study Material Video For One Armed55 Minutes
- 1.5Customised Firewall Day-1 Introduction of Technologies136 Minutes
- 1.6Customised Firewall Day-2 Basics of Palo-Alto Firewall174 Minutes
- 1.7Extra Material For HA & VPN
- 1.8Extra Doubt Session32 Minutes
- 1.9Customised Firewall Day-3 Site To Site VPN172 Minutes
- 1.10Customised Firewall Day-4 Nat On Palo-Alto Firewall182 Minutes
- 1.11Customised Firewall Day-5 DNAT & Sub Interface On FW184 Minutes
- 1.12Customised Firewall Day-6 IPS IDS Technology184 Minutes
- 1.13Customised Firewall Day-7 Introduction to Juniper Firewall (SRX)172 Minutes
- 1.14Customised Firewall Day-8 NAT Technology on SRX155 Minutes
- 1.15Customised Firewall Day-9 Palo-Alto Doubt Session169 Minutes
- 1.16Customised Firewall Day-10 Juniper VPN LAB218 Minutes
- 1.17Customised Firewall Day-11 Introduction of LTM126 Minutes
- 1.18Customised Firewall Day-12 LAB Of LTM154 Minutes
- 1.19Customised Firewall Day-13 Introduction To Pen Testing129 Minutes
- 1.20Customised Firewall Day-14 LTM one Armed and juniper IPS LAB195 Minutes
- 1.21Customised Firewall Day-1665 Minutes
- 1.22Customised Firewall Day-15181 Minutes
- 1.23Customised Firewall Day-14 LTM one Armed55 Minutes