# | Topics Discussed |
---|---|
1 | DHCP Starvation |
2 | Rouge DHCP Server |
3 | MITM (Man in the Middle Attack) aka ARP Poisoning |
4 | DNS Spoofing with MITM |
# | Topics Discussed |
---|---|
5 | Configuring Extended ACLs |
6 | Understanding Network Address Translation (NAT) |
7 | Configuring NAT and PAT |
8 | Static NAT |
# | Topics Discussed |
---|---|
9 | Understanding Confidentiality, Integrity, Non-Repudiation and Authenticity |
10 | Practicing AES Symmetric Key Encryption |
11 | Practicing RSA Asymmetric Key Encryption |
12 | Practicing Diffie-Helman Asymmetric Key Encryption |
13 | Practicing HASH and HMAC |
14 | Practicing Digital Signature |
15 | Understanding and Working on Certificate Authority |
# | Topics Discussed |
---|---|
16 | Understanding the purpose of Proxy Servers |
17 | Installing and Configuring Squid Proxy Server - Explicit Proxy |
18 | Practing URL filtering, File Blocking on Proxy Server |
19 | Setting Up Transparent Proxy Server |
20 | SSL Interception on Squid Proxy Server |
# | Topics Discussed |
---|---|
21 | PaltoAlto - Initial Config |
22 | Understanding Zone Based Firewall Concepts and Creating Security Zones |
23 | Configuring Security policies between zones |
24 | DHCP Server - DNS Server - Default Route |
25 | Configuring NAT - Dynamic NAT and Static NAT - Int Mgmt Profile |
26 | PA Service Route - Understanding Port Tunneling - Layer 7 Application Filtering |
27 | Application Category - High to Low Risk Applications - Application Group - Application Filter |
28 | Creating Custom Applications |
29 | Configuring URL Filtering - Custom URL Category - External Dynamic Lists |
30 | SSL Decryption( Trusted and Untrusted Certificate ) |
31 | Exclude SSL Decryption for Financial Sites |
32 | Configuring Geo Based ACL (Inbound & Outbound) and Time Based ACL |
33 | File type Blocking - Content Awareness (Upload and Download) |
34 | Marking Tags - Import and Export Configs |
35 | Working of Traceroute - Purpose of Having TTL - ARP - Proxy ARP |
36 | VLAN Concepts - VLAN on Cisco IOS - Inter VLAN Routing |
37 | PA Licensing and Monitoring |
38 | Configuring Layer 3 Sub Interfaces on PA |
39 | Configuring Floating Route with Path Monitoring |
40 | Equal Cost Multi Path Load Balancing Technique |
41 | Policy Based Forwarding - PFB |
42 | Captive Portal with Local User Accounts |
43 | Deployment Modes - Vwire - TAP - Layer 2 |
44 | DDOS Protection - Threat Prevention Policy |
45 | Quality Of Service (QOS) - Speed Limiting with Applications |
46 | User ID integration with AD |
47 | Application Control Override - ACC - Data Leakage |
48 | High Availability(active/standby) |
49 | Understading Site-2-Site and Remote Access VPN |
50 | Configuring Site-2-Site VPN on Cisco Router |
51 | Understading NAT Traversal |
52 | PA and ASA Site-2-Site IPSEC VPN ( IKEv1 and IKEv2 ) |
53 | Remote Access & Clientless SSL VPN - Global Protect |
54 | NAT Traversal in Site-to-Site VPN |
55 | Panorama in PaloAlto ( Only Theory ) |
# | Topics Discussed |
---|---|
56 | Install and Configure Check Point GAiA OS R80.10 |
57 | Run the First Time Wizard on GAiA OS R80.10 |
58 | CheckPoint Standalone and Distributed Architecture |
59 | CheckPoint Security Gateway and Security Management Server |
60 | Secure Internal Communication (SIC) |
61 | Objects, Security Zones and Anti-Spoofing. |
62 | Understand Rules and Configure a Typical Rule Base |
63 | Policy Types. Working with Policy Packages |
64 | Configure Management and Stealth Rules |
65 | Define General Traffic Rules - DNS, HTTP, DMZ |
66 | Define Cleanup Rule. Organize Rule Base with Sections |
67 | Understand Network Address Translation (NAT) |
68 | Configure Hide NAT |
69 | Configure Static NAT |
70 | Configure a Basic Access Control Policy |
71 | Implement HTTPS Inspection Policy |
72 | Configure Advanced Access Control Policies. |
73 | Inline Layers |
74 | Geo Based ACL and Time Based ACL |
75 | Application Control and URL Filtering. Content Awareness. |
76 | Speed Limiting and Bypass HTTPS |
77 | Introduction to Threat Prevention Policies |
78 | Configure Backup for Management and Security Gateways |
79 | Add Mulitple GW in CP SMS |
80 | Introduction to Check Point VPNs - Site-to-Site and Remote Access VPNs |
81 | Implement Site-to-Site VPN Between Two Sites |
82 | Understand and Configure Check Point Logging |
83 | User Management and Identity Awareness |
84 | Expand knowledge and learn about ClusterXL |
85 | Understand howto Licensing Check Point Solutions and Products |