National CAE Designated Institution
  • Online, Instructor-Led
Course Description

This course introduces students to the design and implementation of firewalls. The course covers such topics as firewalls using CISCO Routers, Microsoft server platform and UNIX platform. Focuses on how firewalls function in these environments and the basic steps to plan and implement firewalls.

Learning Objectives

  1. Identify and implement different firewall configuration strategies and setup firewall rules that reflect an organizations overall security approach.
  2. Understand authentication, its criticality to network security, why and how firewalls authenticate users, the types of authentication groups, and the advantages and disadvantages of popular centralized authentication systems.
  3. Understand the various technologies that are used to implement detection and prevention.
  4. Know how firewalls work, misconceptions, and understand why a firewall is dependent on an effective security policy.
  5. Understand how proxy servers work and the goals an organization can achieve using a proxy server.
  6. Establish a set of rules and restrictions for a firewall and demonstrate the ability to support and maintain a firewall by updating, adhering to proven security principles, tracking logs, and following basic initial steps in response to security incidents.
  7. Understand the components and essential operations of virtual private networks (VPNs) and the different types and explain basic VPN concepts including encapsulation, encryption, and authentication in VPNs.

Framework Connections

The materials within this course focus on the NICE Framework Task, Knowledge, and Skill statements identified within the indicated NICE Framework component(s):

Specialty Areas

  • Cyber Operations
  • Risk Management
  • Network Services
  • Systems Administration

Specialty Areas have been removed from the NICE Framework. With the recent release of the new NICE Framework data, updates to courses are underway. Until this course can be updated, this historical information is provided to give better context as to how it can help you with your cybersecurity goals.