Firewall Configuration, Policies & Authentication
Become a Cyber Security Specialist by learning Computer Networks Security Technologies and Tools for Network Security Architects and Cyber Security Officers.

Mohamed Ibrahim
-
Rating
(0) - 0 Reviews
- 1102 Students Enrolled
- 05:17 Hours

Course Overview
Just as a firewall in a building attempts to prevent a fire from spreading, a computer firewall attempts to prevent computer viruses from spreading to your computer and to prevent unauthorized users from accessing your computer. A firewall exists between your computer and the network. It determines which services on your computer remote users on the network can access. A properly configured firewall can greatly increase the security of your system. It is recommended that you configure a firewall for any Red Hat Enterprise Linux system with an Internet connection.
Who this course is for:
- Network administrators
- Cyber security officers
- Network security postgraduates
- Network technical support specialists
- Security incident handlers
- IT Engineers and CEOs
- Software Developers - Security
- Web Developers - Security
- Mobile Applications Developers - Security
What you'll learn
- Interface IPs
- DNS Database and Configuration
- Introduction of Logging and Monitoring
- Enable Logging on Firewall Policies
- Matching traffic to Firewall policies
- Introduction to Network Address Translation
- Firewall authentication
- Firewall authentication methods
Course Curriculum
-
Administrative Access 00:02:14
-
Administrative Access 00:02:14
-
Link Aggregation 00:01:25
-
Link Aggregation 00:01:25
-
Interface IPs 00:02:52
-
Interface IPs 00:02:52
-
Interface Role Compare... 00:02:20
-
Interface Role Compared to Alias 00:02:20
-
FortiGate as a DHCP an... 00:03:12
-
FortiGate as a DHCP and DNS server 00:03:12
-
DNS Database and Confi... 00:04:14
-
DNS Database and Configuration 00:04:14
-
Upgrade and Downgrade 00:01:05
-
Upgrade and Downgrade 00:01:05
-
Introduction of Loggin... 00:12:51
-
Describe Log types and... 00:08:22
-
Describe Log types and Subtypes 00:08:22
-
Describe Log Security ... 00:03:21
-
Describe Log Security levels 00:03:21
-
Describe Log Format (H... 00:03:13
-
Identify log Storage l... 00:08:23
-
Identify log Storage locations 00:08:23
-
Configure Log Settings 00:08:11
-
Configure Log Settings 00:08:11
-
Configure Remote Loggi... 00:14:01
-
Configure Remote Logging 00:14:01
-
Enable Logging on Fire... 00:06:50
-
Enable Logging on Firewall Policies 00:06:50
-
View, Filter, Download... 00:12:13
-
Monitor your Work 00:04:16
-
Monitor your Work 00:04:16
-
Configure alert email 00:01:41
-
Configure alert email 00:01:41
-
Configure, run, and vi... 00:06:47
-
Configure, run, and view reports 00:06:47
-
Firewall policies I 00:19:57
-
Firewall policies I 00:19:57
-
Firewall policies II 00:21:18
-
Firewall policies II 00:21:18
-
Firewall policies III 00:20:40
-
Firewall policies III 00:20:40
-
Firewall policies IV 00:20:40
-
Firewall policies IV 00:20:40
-
Matching traffic to Fi... 00:01:54
-
Source IP address, Dev... 00:01:54
-
Interface or Zone 00:02:00
-
Interface or Zone 00:02:00
-
Introduction to Networ... 00:05:42
-
Choose between Firewal... 00:10:50
-
Different types of IP ... 00:04:08
-
Virtual IPs configurat... 00:08:52
-
Central SNAT policy co... 00:12:08
-
DNAT and Virtual IPs 00:03:31
-
DNAT and Virtual IPs 00:03:31
-
Use a SIP session help... 00:05:57
-
Use a SIP session helper for VoIP 00:05:57
-
How to interpret sessi... 00:11:41
-
How to interpret session table 00:11:41
-
Firewall authenticatio... 00:07:33
-
Firewall authentication 00:07:33
-
Firewall authenticatio... 00:04:52
-
Firewall authentication methods 00:04:52
-
Remote authentication ... 00:02:37
-
Remote authentication servers 00:02:37
-
User configuration for... 00:20:37
-
Active and Passive aut... 00:00:42
-
Active and Passive authentication 00:00:42
-
Remote authentication ... 00:09:35
-
User authentication 00:09:03
-
User authentication 00:09:03
-
Captive portal and dis... 00:04:03
Mohamed Ibrahim
- 52 Courses
- 2416 Students
- 0 Reviews
DR.MOHAMED IBRAHIM, B.E, CCIE, VCIX, NSE3
He is having 20+ years of experience in IT with expertise in Networking, Security, Data Center, Virtualization, and HCI. He has handled major ICT projects across the Middle East region covering UAE, Qatar, and Kuwait and also trained hundreds of students around the globe in the Network Security domain from basic level to expert level.
Item Reviews - 0
Submit Reviews
This Course Include:
- 05:17 Hours On-Demand Videos
- 42 Lessons
- Lifetime Access
- Access on Mobile and TV
- Certificate of Completion