Power of Next Generation Firewalls
Power of Next Generation Firewalls
Advanced
6 Hrs
Learn how the main Fortress of the Network – a Firewall, has been evolved so far to protect us against invaders from the Cyber Space
Learn how the main Fortress of the Network – a Firewall, has been evolved so far to protect us against invaders from the Cyber Space
Overview
Are you preparing to purchase a next-generation firewall for your organization? Then stay tuned since we will teach you how to do the sizing correctly, so you can be sure that the product you will buy will be the right fit for your organization.
Learn what next-generation firewalls are capable of and what are some caveats. Learn what next-generation firewalls are capable of and what are some caveats. We will teach you also some threat hunting techniques with next-generation firewalls. Through the labs, you will have an opportunity to create a next-generation security policy with pfsense, an open-source next-generation firewall, but we will also show you how to achieve the same with some of the key players in the market: Palo Alto Networks, Check Point and Cisco.
In the end, you will see how to prove the firewall is not causing a network outage, that is what are some troubleshooting techniques useful with next-generation firewalls.
What You Will Learn
- Learn what is a (network) firewall and why it is useful?
- Understand how the network firewalls evolved and what is a next generation firewall?
- Learn how next generation firewalls filter the traffic by applications?
- Learn how to set up a user id-based firewall policy?
- Understand how we can protect end users from accessing malicious Internet content with next generation firewall?
- Learn how next generation firewall can detect and stop an attack?
Prerequisites
- You need to know basic networking concepts such as IP addressing and static routing.
- You should be able to describe what could be a Virtual Private Network (VPN) and what to do with it.
- You need to have the knowledge of common cybersecurity threats, such as virus, ransomware, hacker, or web application threats.
- A computer system with at least the following:
- A PC with broadband Internet connection, web browser, and sound output devices such as speakers or headphones, so you can watch and listen to video presentations.
- If you would like to follow the steps shown during lab demos, you will need access to either:
- Palo Alto Networks firewall (in version 7.0 or later) with Threat Prevention, URL Filtering and Wildfire license in a lab environment.
- Cisco Threat Defense firewall managed with FirePOWER Management Center (in version 6.4 or later) with TMC license in a lab environment.
- Check Point firewall (in version of R80.40 or later) licensed for the following Blades: Firewall, Application Control, Identity Awareness, URL Filtering, IPS, Anti-Virus, Threat Emulation, Threat Extraction.
- PfSense open-source next-generation firewall which you can get with no charge from https://www.pfsense.org/
Content
Chapter 1: Different Kinds of Firewalls
6 Videos
Agenda What is a Network Firewall? Basic Firewall Router Access Control List (ACL) Stateful Firewall Stateless vs Stateful Key Points $7 Million Cybersecurity Scholarship by EC-Council Chapter 1 Quiz
Preview
Chapter 2: Next Generation Firewall Overview
4 Videos
Agenda Traditional Firewall Shortcomings Application Recognition Next Generation Firewall Key Pointers Chapter 2 Quiz
Preview
Chapter 3: Application Detection
7 Videos
Agenda Application Detection Overview Lab Demo – Cisco FirePOWER Threat Defense Lab Demo – Checkpoint Smart Console Demo – Palo Alto Networks Lab Demo – pfSense Application Detection Key Pointers Chapter 3 Quiz
Preview
Chapter 4: Intrusion Prevention
7 Videos
Agenda Intrusion Prevention/Detection Overview Lab Demo – Cisco FirePOWER Threat Defense Lab Demo – Checkpoint Smart Console Demo – Palo Alto Networks Lab Demo – pfSense Application Detection Key Pointers Chapter 4 Quiz
Preview
Chapter 5: URL Filtering
6 Videos
Agenda and Overview Lab Demo – Checkpoint Smart Console Lab Demo – Cisco FirePOWER Threat Defense Demo – Palo Alto Networks Lab Demo – pfSense URL Filtering Key Pointers Chapter 5 Quiz
Preview
Chapter 6: Anti-malware
6 Videos
Agenda and Overview Lab Demo – Checkpoint Smart Console Lab Demo – Cisco FirePOWER Threat Defense Demo – Palo Alto Networks Lab Demo – pfSense Anti-Malware Key Pointers Chapter 6 Quiz
Preview
Chapter 7: Decryption
5 Videos
Agenda Pre-requisites How it Works? Caveats Decryption Key Pointers Chapter 7 Quiz
Preview
Chapter 8: The User Identity Mapping
5 Videos
Agenda What is the User Identity Mapping? The Concept Caveats The User Identity Mapping Key Pointers Chapter 8 Quiz
Preview
This course is part of a learning path
723 enrollments
Course
Power of Next Generation Firewalls
$49.99
career path
Becoming a Network Management and Security Specialist
Becoming a Network Management and Security Specialist Without Spending a Fortune on Your Training!
Instructor
Igor Mamuzic
Get access to only this course
$49.99
One-time PaymentGet access to all 500+ courses with EC-Council Pro
$59.99/Month
Get access to all 500+ courses with EC-Council Pro
$599/Year
Get 2 months free!
Looking to train your team?
Try EC-Council Enterprise »Reviews
(240 reviews)
5
Average Course Rating
Related Courses
469 enrollments
Course
CCNA - Understanding Routers and Switches
$49.99
231 enrollments
Course
CISSP Certification Domains 5, 6, 7, and 8 Video Training
$69.99
809 enrollments
Course
Learn Ethical Hacking by Hacking Real Websites Legally
$69.99