Firewall Administration Essential Training

Firewall Administration Essential Training
Firewall Administration Essential Training
English | MP4 | AVC 1280×720 | AAC 48KHz 2ch | 2 Hours | 333 MB

Security is the greatest need in the digital world right now, and it shows no sign of slowing down. And when it comes to protecting a private network, a firewall is the most fundamental security technology out there. In this course, Sean Colins covers the fundamentals of firewall functionality, configuration, and administration in short, easy-to-understand segments designed to put this complex network security technology into the reach of novice to intermediate firewall administrators. Sean goes over basic and advanced firewall configuration tasks, shares practical case studies, and offers troubleshooting tips. Upon wrapping up this course, you’ll be ready to get your own firewall up and running on your network.

Topics include:

  • Designing your network
  • Creating firewall schedules and rules
  • Setting up a virtual IP
  • Using aliases to group hosts
  • Preventing local traffic from exiting to the internet
  • Using Snort and other intrusion detection systems
  • Prioritizing VoIP traffic
  • Blocking access to specific websites
  • Troubleshooting gaming performance issues
  • Interpreting TCP flag definitions
Table of Contents

Introduction
1 Build a secure network barrier with a firewall
2 Why do you need a firewall
3 Types of firewalls
4 Decide which type of firewall to use
5 What it wont do
6 Plan for your firewall
7 Design your network
8 Document your design

Basic Firewall Configuration
9 Understand traditional firewalls
10 Understand protocols
11 Initial setup
12 Create firewall schedules
13 Create firewall rules
14 Create floating rules
15 Allow specific inbound traffic with rules

Advanced Firewall Configuration
16 Use aliases to efficiently group hosts
17 Use ports in aliases
18 Prevent local traffic from exiting to the internet
19 Traffic shaping
20 Introduction to IPS IDS via Snort

Configuration Case Studies
21 Prioritizing VOIP traffic
22 Blocking access to websites
23 Intrusion protection basics
24 Reducing priority by application type
25 Understand proxies and SSL

Troubleshooting
26 Firewall command-line access
27 Firewall rule troubleshooting
28 Troubleshoot gaming performance
29 Troubleshoot software updates
30 Read logs and interpret TCP flag definitions

Conclusion
31 Next steps