Introduction to Firewalls

Level:
Total time:
Provider rating: 10 Perpetual Solutions has an average rating of 10 (out of 1 reviews)
Logo Perpetual Solutions

Tip: Receive more information about the programme, starting dates & price. Or request a proposal from multiple providers for in-house training.

Overview

Your experience of this course?

Did you attend the course Introduction to Firewalls at Perpetual Solutions? Help other people by submitting your review at Springest!

Springest will donate £1.- to the Edukans Foundation as a thank you for each review

 
Schedule:
Daytime
Run time:
3 days
Location type:
Open

price, completion, maximum participants, and starting dateplaces are unknown for this course.

Prerequisites:

Delegates should have a reasonable knowledge of IT in general. You should feel comfortable investigating system settings through a Windows GUI interface, as well as entering line commands in console environments. Some investigations may be carried out on a UNIX platform. The course has technical content, but this is technically in breadth, rather than depth.

Course Description:

This course will enable you to understand the workings of firewall technology, from a security or audit standpoint. The IT technical components will be explained to you, so you will understand how the various elements work together.

This course is suitable for anyone who needs to know and understand the wor…

Read the complete description

Description

Prerequisites:

Delegates should have a reasonable knowledge of IT in general. You should feel comfortable investigating system settings through a Windows GUI interface, as well as entering line commands in console environments. Some investigations may be carried out on a UNIX platform. The course has technical content, but this is technically in breadth, rather than depth.

Course Description:

This course will enable you to understand the workings of firewall technology, from a security or audit standpoint. The IT technical components will be explained to you, so you will understand how the various elements work together.

This course is suitable for anyone who needs to know and understand the workings of firewall technology, from a security or audit standpoint, should attend this course. If you come from one of these business areas, you would find the course very useful:
- IT systems implementer wishing to protect vulnerable systems.
- IT manager wishing to understand why the purchase of firewalling is necessary and what is involved.
- Senior user or system owner wishing to understand ways of mitigating risk.
- Network analyst looking to understand options for firewall protection.
- Computer auditors and computer audit planners.
- Computer security specialists.
- Business risk analysts.

This course includes the following modules:

Introduction

  • What are we protecting ourselves against?
  • Which persons are the threat?
  • What do we have that anyone would wish to violate?

Communications Protocols Used on the Internet

  • TCP/IP mechanism
  • Ports and services
  • Network services
  • Intruder techniques
  • Port scanning and detection
  • TCP/IP based threats

Harvesting Information

  • What intruders are looking for
  • Tools of the trade
  • Attack signatures

Introducing Encryption

  • Business objectives
  • Types of encryption
  • Virtual private networks

Traffic Control

  • Firewalls
  • Application level filtering and proxy services

System Security Checks

  • Top 20 IT-based vulnerabilities

For online live training advice please visit our Learning Advice Centre on our website. Be sure to follow us on Twitter to receive special course offers, news and updates!

Reviews

There are no reviews yet. Submit your review and help other people make the right choice. As a thank you for your effort we will donate £1.- to Stichting Edukans.

More courses within this subject:

Compare 36,001 training courses in subjects like Firewall

Subscribe to our newsletter?

Receive news, tips, articles, interviews and education on personal development each month.

Sign up to create your own Learning Lists.

Not for humans