Become a Cyber Security Specialist by learning Computer Networks Security Technologies and Tools for Network Security Architects and Cyber Security Officers.
Mohamed Ibrahim
-
Rating
(0) - 0 Reviews
- 1102 Students Enrolled
- 05:17 Hours
Course Overview
Just as a firewall in a building attempts to prevent a fire from spreading, a computer firewall attempts to prevent computer viruses from spreading to your computer and to prevent unauthorized users from accessing your computer. A firewall exists between your computer and the network. It determines which services on your computer remote users on the network can access. A properly configured firewall can greatly increase the security of your system. It is recommended that you configure a firewall for any Red Hat Enterprise Linux system with an Internet connection.
Who this course is for:
- Network administrators
- Cyber security officers
- Network security postgraduates
- Network technical support specialists
- Security incident handlers
- IT Engineers and CEOs
- Software Developers - Security
- Web Developers - Security
- Mobile Applications Developers - Security
What you'll learn
- Interface IPs
- DNS Database and Configuration
- Introduction of Logging and Monitoring
- Enable Logging on Firewall Policies
- Matching traffic to Firewall policies
- Introduction to Network Address Translation
- Firewall authentication
- Firewall authentication methods
Course Curriculum
-
Administrative Access 00:02:14
-
Administrative Access 00:02:14
-
Link Aggregation 00:01:25
-
Link Aggregation 00:01:25
-
Interface IPs 00:02:52
-
Interface IPs 00:02:52
-
Interface Role Compare... 00:02:20
-
Interface Role Compared to Alias 00:02:20
-
FortiGate as a DHCP an... 00:03:12
-
FortiGate as a DHCP and DNS server 00:03:12
-
DNS Database and Confi... 00:04:14
-
DNS Database and Configuration 00:04:14
-
Upgrade and Downgrade 00:01:05
-
Upgrade and Downgrade 00:01:05
-
Introduction of Loggin... 00:12:51
-
Describe Log types and... 00:08:22
-
Describe Log types and Subtypes 00:08:22
-
Describe Log Security ... 00:03:21
-
Describe Log Security levels 00:03:21
-
Describe Log Format (H... 00:03:13
-
Identify log Storage l... 00:08:23
-
Identify log Storage locations 00:08:23
-
Configure Log Settings 00:08:11
-
Configure Log Settings 00:08:11
-
Configure Remote Loggi... 00:14:01
-
Configure Remote Logging 00:14:01
-
Enable Logging on Fire... 00:06:50
-
Enable Logging on Firewall Policies 00:06:50
-
View, Filter, Download... 00:12:13
-
Monitor your Work 00:04:16
-
Monitor your Work 00:04:16
-
Configure alert email 00:01:41
-
Configure alert email 00:01:41
-
Configure, run, and vi... 00:06:47
-
Configure, run, and view reports 00:06:47
-
Firewall policies I 00:19:57
-
Firewall policies I 00:19:57
-
Firewall policies II 00:21:18
-
Firewall policies II 00:21:18
-
Firewall policies III 00:20:40
-
Firewall policies III 00:20:40
-
Firewall policies IV 00:20:40
-
Firewall policies IV 00:20:40
-
Matching traffic to Fi... 00:01:54
-
Source IP address, Dev... 00:01:54
-
Interface or Zone 00:02:00
-
Interface or Zone 00:02:00
-
Introduction to Networ... 00:05:42
-
Choose between Firewal... 00:10:50
-
Different types of IP ... 00:04:08
-
Virtual IPs configurat... 00:08:52
-
Central SNAT policy co... 00:12:08
-
DNAT and Virtual IPs 00:03:31
-
DNAT and Virtual IPs 00:03:31
-
Use a SIP session help... 00:05:57
-
Use a SIP session helper for VoIP 00:05:57
-
How to interpret sessi... 00:11:41
-
How to interpret session table 00:11:41
-
Firewall authenticatio... 00:07:33
-
Firewall authentication 00:07:33
-
Firewall authenticatio... 00:04:52
-
Firewall authentication methods 00:04:52
-
Remote authentication ... 00:02:37
-
Remote authentication servers 00:02:37
-
User configuration for... 00:20:37
-
Active and Passive aut... 00:00:42
-
Active and Passive authentication 00:00:42
-
Remote authentication ... 00:09:35
-
User authentication 00:09:03
-
User authentication 00:09:03
-
Captive portal and dis... 00:04:03
Item Reviews - 0
Submit Reviews
This Course Include:
- 05:17 Hours On-Demand Videos
- 42 Lessons
- Lifetime Access
- Access on Mobile and TV
- Certificate of Completion