This course introduces the principles of securing networks using routers and firewalls. Topics include networking protocols, threat mitigation, firewall configuration, authentication, authorization, intrusion detection, encryption, IPSec, VPNs, and remote access technologies. Upon completion, students should be able to secure internal networks using router and firewall technologies.
Learning Objectives
1. Describe Palo Alto Networks next-generation firewalls, both hardware and software offerings. | 2. Describe Palo Alto Networks next-generation firewall flow logic and participate in several tutorials for initial configuration of a next-generation firewall. | 3. Perform initial configuration of a next-generation firewall. | 4. Analyze security policy and NAT concepts, along with firewall configurations. | 5. Configure application properties and write firewall rules to permit or deny running of specific applications. | 6. Set up malware content identification through antivirus and anti-spyware security policies for next-generation firewalls. | 7. Manage access to URL web addresses and content. | 8. Decrypt and screen traffic as it passes through the firewall. | 9. Integrate WildFire within a security architecture, examining file contents and building virus signature databases. | 10. Describe next-generation firewall setup and authentication of User-ID as well as monitoring and logging of User-ID-to-device mapping. | 11. Configure firewall authentication certificates, security profiles, and client agents. | 12. Configure the next-generation firewall dashboard and filters to refine widget display results, interacting with the ACC. | 13. Configure next-generation firewall port assignments for high availability control, management, and data link connections, as well as monitoring of heartbeat notifications.
Framework Connections
The materials within this course focus on the NICE Framework Task, Knowledge, and Skill statements identified within the indicated NICE Framework component(s):
Competency Areas
Work Roles
Feedback
If you would like to provide feedback on this course, please e-mail the NICCS team at NICCS@mail.cisa.dhs.gov. Please keep in mind that NICCS does not own this course or accept payment for course entry. If you have questions related to the details of this course, such as cost, prerequisites, how to register, etc., please contact the course training provider directly. You can find course training provider contact information by following the link that says “Visit course page for more information...” on this page.