FIREWALL BOOTCAMPS

FIREWALL & SECURITY BOOTCAMPS

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

Some of the highlights of the course:

Delivery Method: Instructor-led online with Class Recorded at the end of each session will be provided in 24 hours.

Our Guarantee: 100% satisfaction is guarantee, not satisfied fully refund will be given no question asked.

LAB: We only use Real hardware & all are our devices are fully licensed. You will be having total 3 weeks lab access, 2 weeks during the training and 1 week after the class. Every student will be having his own setup, test PC test all the services LAN, DMZ and Outside (internet) on our live network,

Instructor: all of our instructor are not only fully certified but have 17+ plus experience, and they are happy to share their knowledge and experience during and after the class. Luckily all the courses will be delivered by Mazhar Minhas.

LAB Access: During the class everyone will be having his own topology, network, project, tasks list we only deliver with the real world prospect making sure students are ready for real world once course finish.

Note: Due to over welcoming response, we only limited seats left, so book early to avoid any disappointment. We only have space for 9 seats as per our RACK & Topology design.

F5 BIG-IP

Local Traffic Management (LTM)

Hands-on Bootcamp

All students attending F5 BIG-IP LTM courses benefit from

access to labs for an additional week following their course completely FREE of charge.

COURSE OVERVIEW

Successful completion of this 20 hours weekend only, the instructor-led course will

enable the student to install, configure, manage and troubleshoot the F5-BIG-IP Local

Traffic Management LTM.

WHO SHOULD ATTEND?

Security Engineers, Network Engineers, and Support staff

PREREQUISITES

✓ Students must have a basic familiarity with networking concepts including

routing, switching, and IP address.

✓ Students should also be familiar with basic network security concepts, and NAT

is a plus but not required.

COURSE OBJECTIVES

Students attending this introductory-level class will gain an in-depth knowledge of how to install,

configure, and manage their F5 BIG-IP Local Traffic Management LTM, as well as configuration steps

for the

➢ Security, networking,

➢ Threat prevention,

➢ Logging,

➢ Reporting features of the F5 BIG-IP LTM.

1. Overview

2. Installation

3. F5 Management – SSH / HTTPS

4. F5 Setup Utility

5. Command Line Access

6. Server Load Balancing

7. Monitoring and Statistics

8. Load Balancing Methods

o Overview

o Around Robin

o Least Connections

o Fastest

o Ratio based on Member

o Ratio based on Node

9. Health Monitors

o Basic Monitors

o Custom Monitors

10. Persistence

o Overview

o Persistence with Cookies

o Persistence with Source IP

11. SSL Termination

o Overview

o SSL Termination (Client-Side)

o SSL Termination with Cookie Persistence

12. iRules

o Overview

o iRule script: Redirecting client based on web browser

o iRule script: Redirecting client based on IP address/subnet

o iRule script: Redirecting client based on the HTTP host (domain name)

13. High Availability

 

 

Manage Multiple Cisco ASA Firepower with FireSIGHT:

 

(Install, Configure Manage & Tshoot Cisco ASA Firepower Threat Defence FTD)

Manage Multiple Cisco ASA Firepower with Firepower Management Centre

(FireSIGHT) on Real Equipment with Subject Matter Expert Trainer

Cisco Firepower Management Centre (FireSIGHT) is a fundamental Sourcefire

technology integrated into Sourcefire next-generation solutions to provide network visibility, context, and automation.

With FireSIGHT Management Centre, you centrally manage hundreds of appliances and analyze events, automate threat prevention updates, configure policies, and generate reports and custom dashboardsFireSIGHT Management Centre, enables users to configure next-generation

Sourcefire technology, including application control, firewall, as well as routing

and switching capabilities.

FireSIGHT Management boot camp course will ensure that the learner gains

extensive hands-on experience on the Real & Licensed hardware along with an

industry-experienced trainer with only one vision in mind.

Watching boring videos, reading books or practicing on your PC with VM Images is

helpful, but the first-hand experience on live Network Equipment with our expert

trainers and consultants will give enough confidence and expertise to someone who

is new to technology.

The advantages of studying on our real/live devices, will not only enhance student

confidence and knowledge but also provide them competitive advantages in an

interview.

Moreover, 40-60% of the next generation Firewall features like URL Filtering,

Threat prevention, Sandbox, etc. cannot be practiced without having the real &

licensed equipment. We have helped many of our customers to achieve their goals.

The unique combination of Expert Trainers and next generation “Network Security”

LAB setup ensures not only the maximum exposure to the entire Technology but alsofacilitates learning in a distinctly conducive environment with our highly skilled and

Industry experienced, CCIE and CCNP Security Certified Trainers.

During and after the class, every candidate will have access to his dedicated network device/topology, Task List based on the real-world scenario, which will be assessed and verified by our subject matter expert.

This course dives deeper into configuring and managing multiple Cisco ASA Firepower firewalls from one Central Location called FireSIGHT Management Centre.

Viewing all your firewall traffic, managing all aspects of device configuration, pushing

global policies, and generating reports on traffic patterns or security incidents — all

from a single console called FireSIGHT.

LAB ACCESS

All students attending Cisco ASA Firewall Training coursesbenefit from access to labs for an additional week following their course completely FREE of charge.

WHO SHOULD ATTEND?

Security Engineers, Network Engineers, and Support staff

PREREQUISITES

 Students must have a basic familiarity with networking concepts including

routing, switching, and IP address.

 Students should also be familiar with basic Network Security Concept, NAT &

VPN IPSEC is a plus but not required.

COURSE OBJECTIVES

Students attending this introductory-level class will gain an in-depth knowledge of how to install,

configure, and manage their Cisco ASA firewall, as well as configuration steps for the

 Security, networking,

 Threat prevention,

 Logging,

 Reporting features of the Cisco ASA Networks Operating System.

DETAILED COURSE OUTLINE

 FireSIGHT System Overview and Classroom Setup

 Hardware Overview and Architecture

 Device Management

 ASA FirePower Service Installation

 ASA FirePower FireSight System Installation

 ASA FirePower FireSight Basic Configuration

 ASA FirePower Device Management and License Install

 ASA FirePower Software Update

 ASA FirePower Introduction to FireSight Web Interface

 ASA FirePower Network Discovery (Host and Application)

 ASA FirePower Network Discovery (User with AD User Agent)

 ASA FirePower Object and Access Control

 ASA FirePower Security Intelligence

 ASA FirePower Application Filtering

 ASA FirePower Custom Application Detector

 ASA FirePower URL and Web Category Filtering

 ASA FirePower File Type Filtering

 ASA FirePower Malware Detection

 ASA FireSIGHT Repotting

 ASA FirePower Compliance Enforcement with Whitelist

 ASA FirePower Event Correlation and Remediation

 ASA FirePower Backup and Restore

 

 

PALO ALTO Panorama:

Manage Multiple Palo Alto Firewalls

All students attending Palo Alto Training courses benefit from access to labs for an additional week following their course completely FREE of charge.

Palo Alto Real Equipment LAB

We have 2 x PA-200 3 Years Licensed connected to Live network environment and accessible via Secured FortiClient 24/7

COURSE OVERVIEW

Successful completion of this 20 hours’ weekend only, instructor-led course will enable

the student to install, configure, and manage the Palo Alto Networks®

next-generation firewalls Panorama™ Management Server.

WHO SHOULD ATTEND?

Security Engineers, Network Engineers, and Support staff

PREREQUISITES

✓ Students must have a basic familiarity with networking concepts including

routing, switching, and IP address.

✓ Students should also be familiar with basic port-based security concepts.

Experience with other security technologies (IPS, proxy, and content filtering)

is a plus but not required.

COURSE OBJECTIVES

Students attending the course will gain an in-depth knowledge of how to install,

configure and manage their Palo Alto Firewall from Panorama Management Server.

Upon completion of this course, administrators will understand the Panorama server’s

role in managing and securing their overall network.

Network professionals will learn to use Panorama’s aggregated reporting to provide

them with a holistic view of a network of Palo Alto Networks next-generation firewalls.

DETAILED COURSE OUTLINE

Module 1: Platforms and Architecture

❖ Single Pass Architecture

❖ Control Plane and Data Plane

❖ Flow Logic

Module 2: Overview

❖ Panorama Solution

❖ Deployment Design

Module 3: Initial Configuration

❖ Interface Configuration

❖ Setup Configurations

❖ Device Deployment

❖ Configuration Management

Module 4: Administration & Management

❖ GUI, CLI, and API

❖ Config Management

❖ PAN-OS & Software Update

Module 5: Interface Configuration

❖ Layer 2, Layer 3, Virtual Wire, Tap

❖ Sub-interfaces

❖ Security Zones

Module 6: Templates

❖ Templates Overview

❖ Common Organization Strategies

❖ Configuring Templates

Module 7: Device Groups

❖ Device Groups

❖ Objects

❖ Policies

❖ Device Group Commit

Module 8: Administration

❖ Admin Roles and Access Control

❖ Commit Procedure

Module 9: Logging and Reporting

❖ Logging

❖ Application Command Center

❖ App-Scope

❖ Correlation Objects

❖ Reports

Module 10: Layer 3 Configuration

❖ Interface Management

❖ Service Routes

❖ Virtual Routers

❖ NAT (source and destination)

❖ IPv6 Overview

Module 11: App-ID™

❖ App-ID Process

❖ Security Policy Configuration

❖ Policy Administration

Module 12: Content-ID™

❖ Antivirus

❖ Anti-spyware

❖ Vulnerability

❖ URL Filtering

❖ File Blocking:

❖ WildFire™

❖ Zone Protection

Module 13: Decryption

❖ SSL Inbound and Outbound

Module 14: User-ID™

❖ Mapping Users to IP

❖ Users in Security Policy

Module 15: High Availability

❖ Configuring Active/Passive HA vi a Panorama

Module 16: VPN Site to Site Tunnel

❖ Palo Alto & Cisco Router via Panorama

 

CCIE RS TRAINING
CCIE SP TRAINING
CCIE SEC TRAINING
CCIE DC TRAINING
FORTINET/PA RACK
CISA CISSP
AWS TRAINING
JUNIPER TRAINING
MCSA + MS
ONLY RACK
ONLY WORKBOOK
 
 
 
 

EVE-NG CLOUD - CONTACT

EVE-NG CLOUD SERVICES

EVE-NG CLOUD PARTNERS

COMPANY DETAILS

UNLCLOUD

Kemp House, 152 City Road, London,

United Kingdom EC1V 2NX

info@eve-cloud.com

CISCO CERTIFICATION TRAINING

VMWARE CERTIFICATION GUIDES

MICROSOFT CERTIFICATION GUIDES

NEXTGEN FIREWALL TRAINING

JUNIPER CERTIFICATION GUIDES

AWS CERTIFICATION GUIDES

SECURITY CERTIFICATION TRAINING

FORTRAY Ltd

Cisco

Amazon