Infobit Technologis
Ashram Road
+ 91 79 27545170
Satellite
+ 91 79 26765170
Ghatlodiya
+ 91 90671 77676
Need Help ?
ash@infobittechnologies.com
  • Home
  • About Us
  • Training Partners
  • Business Partners
  • Contact Us
Courses

Microsoft

  • MCITP
  • MCSA 2008
  • MCSA 2012
  • MCTS

Cisco

  • CCNA
  • CCNA Security
  • CCNP

Oracle

  • OCA
  • OCP
  • OCPJP
  • Solaris Administrator

IBM

  • Lotus Admin
  • AIX Admin

Juniper

  • JNCIA

CompTia

  • A+
  • N+

Other Courses

  • RHCE (RedHat Linux Administrator)
  • Ethical Hacking
  • VCA/VCP (Vmware)
  • Amazon AWS

Career Courses

  • DCNT (Diploma In Computer Hardware & Networking Technology)
  • University Program
ICFE (Infobit Certified Firewall Engineer)

Introduction

This Combo of comprehensive Firewall expert courses endeavors to deliver the extensive know-how of Check point, Fortigate, Cyberoam.


Prerequisites :Knowledge of Computer Hardware, Network and Server Administration.

Course Duration:1 & ½ Month

Batch Time: 1) 8:00 am to 9:30 am 2) 7:30 to 9:00 p.m 3) Weekend SAT/SUN

Why INFOBIT :

Since 1999 Infobit Technologies is a leader in the high end

Latest technologies IT education industry and ITES . Organizations continue to upgrade, standardize and integrate their systems to develop and sustain their competitive edge.

  • Industrial Experienced Faculty
  • Certified Trainer
  • Totally Practical Training on LAB
  • Dedicated Lab Facility (10 AM to 7 PM )
  • Week End Batch for the JOB Professional

ccna01

Course Content:

Check Point Overview

1. Welcome to CCSAc

2. Check Point Fundamentals

3. Installing GAiA

4. Linking the Manager & Firewall

5. Pushing Policy

6. NAT

7. Policy Packages & Database Versions

8. SmartView Tracker

9. SmartView Monitor

10. LDAP

11. Identity Awareness

12. App Control and URL Filtering

13. HTTPS Inspection

14. CLI

15. IPsec VPNs (Site to Site)

16. Backup and Recovery

17. Smart Update

18. Additional Check Point Features

19. CCSA Exam Success


Fortigate firewall

fortigate 1: Objectives

After completing these courses, you will be able to:

-Describe capabilities of FortiGate UTM

-Neutralize threats / misuse: viruses, torrents, and inappropriate web sites

-Control network access based on device type

-Authenticate users via firewall policies

-Offer an SSL VPN for secure access to your private network

-Establish an IPsec VPN tunnel between two FortiGate appliances

-Compare policy- vs. tunnel-based IPsec VPN

-Apply port forwarding, source NAT, and destination NAT

-Interpret log entries

-Generate reports

-Use the GUI and CLI for administration

-Deploy the right operation mode

-Deploy an explicit proxy with firewall policies, authentication, and caching

-Simplify protocol handling with application control

fortigate 2: Objectives

After completing these couses, you will be able to:

-Deploy FortiGate devices as an HA cluster for fault-tolerance & high performance

-Inspect traffic transparently, forwarding as a Layer 2 device

-Manage FortiGate device's route table

-Route packets using policy-based and static routes for multi-path and load-balance deployments

-Connect virtual domains (VDOMs) without packets leaving FortiGate

-Implement a meshed / partially redundant VPN

-Diagnose failed IKE exchanges

-Fight hacking & denial of service (DoS)

-Diagnose IPS engine performance issues

-Offer Fortinet Single Sign On (FSSO) access to network services, integrated with Microsoft Active Directory

-Inspect SSL/TLS-secured traffic to prevent encryption used to bypass security policies

-Understand encryption functions and certificates

-Defend against data leaks by identifying files with sensitive data, and blocking them from leaving your private network

-Diagnose and correct common problems

-Optimize performance by configuring to leverage ASIC acceleration chips, such as CP or NPs, instead of only the CPU resources

-Implement IPv6 and hybrid IPv4-IPv6 networks

Cyberoam

Module 1: Cyberoam Product Overview

-Cyberoam UTM overview

-Cyberoam Central Console Overview

-Cyberoam on-cloud management overview

-Cyberoam iView Overview

Module 2: Deploying Cyberoam

-Prerequisites for deployment

-Network Diagrams & Scenarios

-Deployment Scenarios

-(Transparent/Gateway/Mixed) Mode

-Failure of Security Device & It's Consequences

-Proxy Scenarios

-Managing connectivity with multiple ISPs

-Manage 3G and Wi-Max connections Labs

Module 3: Firewall

-How to Control Access

-Managing the Firewall

-Identifying Each Machine on the network

-NAT

-DoS (Denial of Service)

-Fusion Technology based Unified Control

-Firewall - as a single solution to identity,Security, connectivity, productivity, and Logging Labs

Module 4: User Authentication

-Types of Authentication(Single Sign On, Local, and External)

-Group Authentication

-Traffic Discovery

-Authenticating from Servers(AD, LDAP, or RADIUS)Labs

Module 5: Web Filter

-Filtering with Keywords

-Filtering with URL

-Filtering by Categories

-Filtering Web Traffic Labs

Module 6: Application Firewall

-Application & P2P Filtering

-Instant Messaging Filters

-Custom Filters

-Compliance based filtering Labs

Module 7: Network Threat Protection

-Web/Mail/FTP Anti-Virus

-Gateway level Anti-Virus/Anti-Spam

-Instant Messaging Anti-Virus

-Virus Outbreak Detection

-Recurrent Pattern Detection

-RBL (Realtime Black List), IP Reputation

-Signature based detection

-Statistical anomaly based detection

-Stateful protocol analysis detection

-Network Based IPS (NIPS) & Wireless Based IPS (WIPS)

-Network Behaviour Analysis (NBA)

-Host Based IPS (HIPS)

-WAF

-Labs

Module 8: VPN

-Threat Free Tunneling

-VPN Bandwidth Management

-VPN Failover

-Identity based authentication in VPN

-Labs

Module 9: QoS

-Traffic Queuing

-Traffic Prioritisation

-Bandwidth Allocation

-Scheduling and sharing bandwidth

-Guaranteed bandwidth

-QoS implementation on user, group, firewall,Application, web category.

-Labs

Module 10: Network High Availability

-High Availability, LAN Failsafe?

-Clustering of devices

-What is link load balancing?

-Why undertake balancing?

-Link fails scenario

-Why failover?

-Multilink Manager

-Load balancing

-Active load balancing and gateway Failover

-Active Passive configuration and gateway Failover

-MPLS failover to VPN

-Automatic ISP failover detection

-Labs

Module 11: General Administration

-Setup Logging

-DNS Management

-DHCP Management

-Upgrading Device Firmware

-Backing Up

-Restoring

-Diagnostic Tools

-Troubleshooting Tools

Module 12: Logging & Reporting

-Labs to provide hands on to deal with maintenance

-Types of Reports

-Data Management

-Report Management

-Compliance reports

-Searching within reports

-Identity based reporting

Inquiry Now
First Name *
Error Message
last Name *
Error Message
Mobile *
Error Message
Fax
City
Centre
Country
Url
Email *
Error Message
Purpose
Comment

The CAPTCHA image


infobittechnologies.com @ 2017   Privacy Policy |   Terms Of Use |   Legal
We are one of the best IT training and certification center in Ahmedabad offering CCNA and CCNP Training of CISCO Certificate, Providing training for MCSA (Microsoft) for Server Administrator, Oracle OCP Certificate, Java Certification Training, Android Development, BigData and Hadoop Certification, VMWare Certification, AWS Amazon Certification, Certified Professional Ethical Hacker certificate from Mile2, College Project Training with Quality Training at no Extra Cost. Besides we are authorized Training center for A+, Microsoft, RedHat Linux, and many more certifications in the field of Hardware & Networking.