India: +91 406677 1418

WhatsApp no. : +919100386313

USA: +1 909 233 6006

Telegram : +15168586242

Internet Firewalls

Internet Firewalls Course Content

Firewall Planning & Design
  • Misconceptions about Firewalls
  • What is a Firewall?
  • Firewall Protection Types
  • Limitations of Firewalls
  • Evaluating Firewall Packages
Security Policy Developing
  • Defining Information Security Policy (ISP) & Types of ISP
  • Why is a Security Policy Important?
  • Goals for an Effective Security Policy
  • Components of Security Policy
  • Acceptable Use Policy
  • Violations & Penalties
  • User Accounts, Password Protection & Remote Access Policies
  • Internet Use Policy & LAN Security Policy
  • Steps to Build an Security Policy
  • Develop a Policy Team
  • Determine Overall Approach to Security
  • Identify Assets to be protected
  • Determining what should be Audited for Security
  • Identify the Security Risks
  • Define the Acceptable Use
  • Accounting for What the Firewall Cannot Do
  • Other Security Policy Topics
  • Documentation & Records Policy & Procedures
  • Storage Media Policies & Procedures
  • Managing Records
  • Continuity Planning & Responses to Security Violations
  • Defining the Incident, Incident Response, Disaster Recovery & Business Continuity (BC)
  • Business Impact Analysis
  • Identification & Prioritization of Threats & Attacks
  • Business Unit Analysis
  • Assessment of Potential Damage
  • Subordinate Plans Classification
  • Incident Response Planning
  • Four Phases of Incident Response (Planning, Detection, Reaction & Recovery)
  • Disaster Recovery Planning2
  • Key Activities & Processes of Disaster Recovery Planning
  • Recovery Operations
  • Business Continuity Planning
  • Developing the Continuity Program
  • Business Continuity Model & The Planning Document
  • Crisis Management
  • Key Crisis Management Activities & Actions
  • Overcoming Administrative Obstacles
  • Educating Employees
  • Presenting & Reviewing the Process
  • Amending Security Policy
Firewall Configuration Strategies
  • Firewall Security Features & Components
  • Types of Firewall Protection
  • Packet Filtering
  • PAT & NAT
  • Application Layer Gateways
  • Categories of Firewall
  • Processing/Configuration Modes
  • Firewall Generations
  • Firewall Structures
  • Firewall Architectures
  • Limitations of Firewalls
  • Firewall Network Perimeter Security & Network Zoning
  • Establishing Rules & Restrictions for Your Firewall
  • Firewall Configuration Strategies
  • Different Firewall Configuration Strategies You Can Use
  • Approaches that Add Functionality to Your Firewall
Packet Filtering
  • Understanding packets & Packet Filtering
  • Approaches to Packet Filtering
  • Setting Specific Packet Filter Rules
Working with Proxy Servers & Application Level Firewalls
  • Proxy Servers Overview
  • Goals of proxy Servers
  • Proxy Server Configuration Considerations
  • Proxy Server Choosing
  • Proxy Server based Firewalls Compared
  • Reverse Proxies
  • When a Proxy Server is not the Correct Choice
Authenticating Users
  • Access Control
  • Mandatory Access Control
  • Data Classification Model
  • Security Clearance3
  • Nondiscretionary Access Control
  • Discretionary Access Control
  • Centralized Versace Decentralized Access Control
  • Access control software management
  • The Authentication Process in General
  • How Firewalls Implement the Authentication Process
  • Authentication with Firewalls Types
  • User Authentication
  • Client Authentication
  • Session Authentication
  • Centralized Authentication
  • Kerberos Authentication
  • TACACIS+
  • Radius
  • Password Security Issues
  • Password Security Tools
  • Other Authentication Systems
Encryption & Firewalls
  • Why Firewalls Need to Use Encryption
  • Encryption Overview
  • Principles of Cryptography
  • Digital Certificates & Public & Private Keys
  • Analyzing Popular Encryption Schemes
  • Symmetric & Asymmetric Encryption
  • Digital Signatures
  • Hybrid Systems
  • Using Cryptographic Controls
  • E-mail Security
  • Securing the Web
  • Using IPSec Encryption
  • Securing Authentication
  • Attacks on Cryptosystems
  • Man in the Middle Attacks
  • Correlation Attacks
  • Dictionary Attacks
  • Timing Attacks
  • Defending from Attacks
Choosing A Bastian Host
  • Installing A Bastian Host: General Requirements
  • Selecting the Host Machine
  • Positioning the Bastian Host
  • Configuring Your Bastian Host
  • Making the Host Defend Itself
  • Selecting Services to be provided
  • Special Considerations for UNIX & Windows Systems
  • Disabling Unnecessary Services & Ports
  • Handling Backups4
  • Auditing the Bastian Host
  • Connecting the Bastian Host
Setting up a Virtual Private Network
  • VPN Components & Operations
  • Types of VPN’s
  • VPN Set ups
  • Tunnelling Protocols Used with VPN’s
  • Enabling Remote Access within VPN’s
  • VPN Best Practices
Building your own Firewall
  • Enterprise Versace Desktop Firewalls
  • Desktop Firewalls & Enterprise Firewalls
Ongoing Administration
  • Making Your Firewall Meet New Needs
  • Identifying the New Risks
  • Adding Software Updates & Patches
  • Adhering to Proven Principles
  • Environmental Management
  • Using an Remote Management Interface
  • Preparing Usage Reports
  • Watching for Suspicious Events
  • Security Breaches Will Happen
  • Using an Intrusion Detection System
  • Receiving Security Alerts
  • When an Intrusion Occurs
  • During & After an Intrusion
  • Compiling Legal Evidence
  • Configuring the Advanced Firewall Functions