| # | Topics Discussed |
|---|---|
| 1 | DHCP Starvation |
| 2 | Rouge DHCP Server |
| 3 | MITM (Man in the Middle Attack) aka ARP Poisoning |
| 4 | DNS Spoofing with MITM |
| # | Topics Discussed |
|---|---|
| 5 | Configuring Extended ACLs |
| 6 | Understanding Network Address Translation (NAT) |
| 7 | Configuring NAT and PAT |
| 8 | Static NAT |
| # | Topics Discussed |
|---|---|
| 9 | Understanding Confidentiality, Integrity, Non-Repudiation and Authenticity |
| 10 | Practicing AES Symmetric Key Encryption |
| 11 | Practicing RSA Asymmetric Key Encryption |
| 12 | Practicing Diffie-Helman Asymmetric Key Encryption |
| 13 | Practicing HASH and HMAC |
| 14 | Practicing Digital Signature |
| 15 | Understanding and Working on Certificate Authority |
| # | Topics Discussed |
|---|---|
| 16 | Understanding the purpose of Proxy Servers |
| 17 | Installing and Configuring Squid Proxy Server - Explicit Proxy |
| 18 | Practing URL filtering, File Blocking on Proxy Server |
| 19 | Setting Up Transparent Proxy Server |
| 20 | SSL Interception on Squid Proxy Server |
| # | Topics Discussed |
|---|---|
| 21 | PaltoAlto - Initial Config |
| 22 | Understanding Zone Based Firewall Concepts and Creating Security Zones |
| 23 | Configuring Security policies between zones |
| 24 | DHCP Server - DNS Server - Default Route |
| 25 | Configuring NAT - Dynamic NAT and Static NAT - Int Mgmt Profile |
| 26 | PA Service Route - Understanding Port Tunneling - Layer 7 Application Filtering |
| 27 | Application Category - High to Low Risk Applications - Application Group - Application Filter |
| 28 | Creating Custom Applications |
| 29 | Configuring URL Filtering - Custom URL Category - External Dynamic Lists |
| 30 | SSL Decryption( Trusted and Untrusted Certificate ) |
| 31 | Exclude SSL Decryption for Financial Sites |
| 32 | Configuring Geo Based ACL (Inbound & Outbound) and Time Based ACL |
| 33 | File type Blocking - Content Awareness (Upload and Download) |
| 34 | Marking Tags - Import and Export Configs |
| 35 | Working of Traceroute - Purpose of Having TTL - ARP - Proxy ARP |
| 36 | VLAN Concepts - VLAN on Cisco IOS - Inter VLAN Routing |
| 37 | PA Licensing and Monitoring |
| 38 | Configuring Layer 3 Sub Interfaces on PA |
| 39 | Configuring Floating Route with Path Monitoring |
| 40 | Equal Cost Multi Path Load Balancing Technique |
| 41 | Policy Based Forwarding - PFB |
| 42 | Captive Portal with Local User Accounts |
| 43 | Deployment Modes - Vwire - TAP - Layer 2 |
| 44 | DDOS Protection - Threat Prevention Policy |
| 45 | Quality Of Service (QOS) - Speed Limiting with Applications |
| 46 | User ID integration with AD |
| 47 | Application Control Override - ACC - Data Leakage |
| 48 | High Availability(active/standby) |
| 49 | Understading Site-2-Site and Remote Access VPN |
| 50 | Configuring Site-2-Site VPN on Cisco Router |
| 51 | Understading NAT Traversal |
| 52 | PA and ASA Site-2-Site IPSEC VPN ( IKEv1 and IKEv2 ) |
| 53 | Remote Access & Clientless SSL VPN - Global Protect |
| 54 | NAT Traversal in Site-to-Site VPN |
| 55 | Panorama in PaloAlto ( Only Theory ) |
| # | Topics Discussed |
|---|---|
| 56 | Install and Configure Check Point GAiA OS R80.10 |
| 57 | Run the First Time Wizard on GAiA OS R80.10 |
| 58 | CheckPoint Standalone and Distributed Architecture |
| 59 | CheckPoint Security Gateway and Security Management Server |
| 60 | Secure Internal Communication (SIC) |
| 61 | Objects, Security Zones and Anti-Spoofing. |
| 62 | Understand Rules and Configure a Typical Rule Base |
| 63 | Policy Types. Working with Policy Packages |
| 64 | Configure Management and Stealth Rules |
| 65 | Define General Traffic Rules - DNS, HTTP, DMZ |
| 66 | Define Cleanup Rule. Organize Rule Base with Sections |
| 67 | Understand Network Address Translation (NAT) |
| 68 | Configure Hide NAT |
| 69 | Configure Static NAT |
| 70 | Configure a Basic Access Control Policy |
| 71 | Implement HTTPS Inspection Policy |
| 72 | Configure Advanced Access Control Policies. |
| 73 | Inline Layers |
| 74 | Geo Based ACL and Time Based ACL |
| 75 | Application Control and URL Filtering. Content Awareness. |
| 76 | Speed Limiting and Bypass HTTPS |
| 77 | Introduction to Threat Prevention Policies |
| 78 | Configure Backup for Management and Security Gateways |
| 79 | Add Mulitple GW in CP SMS |
| 80 | Introduction to Check Point VPNs - Site-to-Site and Remote Access VPNs |
| 81 | Implement Site-to-Site VPN Between Two Sites |
| 82 | Understand and Configure Check Point Logging |
| 83 | User Management and Identity Awareness |
| 84 | Expand knowledge and learn about ClusterXL |
| 85 | Understand howto Licensing Check Point Solutions and Products |