Duration : 100 Hrs     |    Cost : Rs.10,000 (Rs.2000 off for Alumni)     |    Difficulty : Intermediate     Enroll
Duration : 100 Hrs
Cost : Rs.10,000 (Rs.2000 off for Alumni)
Difficulty : Intermediate

Enroll

Basic Network Attacks with Kali Linux

# Topics Discussed
1 DHCP Starvation
2 Rouge DHCP Server
3 MITM (Man in the Middle Attack) aka ARP Poisoning
4 DNS Spoofing with MITM

Working on Cisco IOS

# Topics Discussed
5 Configuring Extended ACLs
6 Understanding Network Address Translation (NAT)
7 Configuring NAT and PAT
8 Static NAT

CRYPTOGRAPHY

# Topics Discussed
9 Understanding Confidentiality, Integrity, Non-Repudiation and Authenticity
10 Practicing AES Symmetric Key Encryption
11 Practicing RSA Asymmetric Key Encryption
12 Practicing Diffie-Helman Asymmetric Key Encryption
13 Practicing HASH and HMAC
14 Practicing Digital Signature
15 Understanding and Working on Certificate Authority

PROXY SERVERS

# Topics Discussed
16 Understanding the purpose of Proxy Servers
17 Installing and Configuring Squid Proxy Server - Explicit Proxy
18 Practing URL filtering, File Blocking on Proxy Server
19 Setting Up Transparent Proxy Server
20 SSL Interception on Squid Proxy Server

PALOALTO

# Topics Discussed
21 PaltoAlto - Initial Config
22 Understanding Zone Based Firewall Concepts and Creating Security Zones
23 Configuring Security policies between zones
24 DHCP Server - DNS Server - Default Route
25 Configuring NAT - Dynamic NAT and Static NAT - Int Mgmt Profile
26 PA Service Route - Understanding Port Tunneling - Layer 7 Application Filtering
27 Application Category - High to Low Risk Applications - Application Group - Application Filter
28 Creating Custom Applications
29 Configuring URL Filtering - Custom URL Category - External Dynamic Lists
30 SSL Decryption( Trusted and Untrusted Certificate )
31 Exclude SSL Decryption for Financial Sites
32 Configuring Geo Based ACL (Inbound & Outbound) and Time Based ACL
33 File type Blocking - Content Awareness (Upload and Download)
34 Marking Tags - Import and Export Configs
35 Working of Traceroute - Purpose of Having TTL - ARP - Proxy ARP
36 VLAN Concepts - VLAN on Cisco IOS - Inter VLAN Routing
37 PA Licensing and Monitoring
38 Configuring Layer 3 Sub Interfaces on PA
39 Configuring Floating Route with Path Monitoring
40 Equal Cost Multi Path Load Balancing Technique
41 Policy Based Forwarding - PFB
42 Captive Portal with Local User Accounts
43 Deployment Modes - Vwire - TAP - Layer 2
44 DDOS Protection - Threat Prevention Policy
45 Quality Of Service (QOS) - Speed Limiting with Applications
46 User ID integration with AD
47 Application Control Override - ACC - Data Leakage
48 High Availability(active/standby)
49 Understading Site-2-Site and Remote Access VPN
50 Configuring Site-2-Site VPN on Cisco Router
51 Understading NAT Traversal
52 PA and ASA Site-2-Site IPSEC VPN ( IKEv1 and IKEv2 )
53 Remote Access & Clientless SSL VPN - Global Protect
54 NAT Traversal in Site-to-Site VPN
55 Panorama in PaloAlto ( Only Theory )

CHECKPOINT R80.10

# Topics Discussed
56 Install and Configure Check Point GAiA OS R80.10
57 Run the First Time Wizard on GAiA OS R80.10
58 CheckPoint Standalone and Distributed Architecture
59 CheckPoint Security Gateway and Security Management Server
60 Secure Internal Communication (SIC)
61 Objects, Security Zones and Anti-Spoofing.
62 Understand Rules and Configure a Typical Rule Base
63 Policy Types. Working with Policy Packages
64 Configure Management and Stealth Rules
65 Define General Traffic Rules - DNS, HTTP, DMZ
66 Define Cleanup Rule. Organize Rule Base with Sections
67 Understand Network Address Translation (NAT)
68 Configure Hide NAT
69 Configure Static NAT
70 Configure a Basic Access Control Policy
71 Implement HTTPS Inspection Policy
72 Configure Advanced Access Control Policies.
73 Inline Layers
74 Geo Based ACL and Time Based ACL
75 Application Control and URL Filtering. Content Awareness.
76 Speed Limiting and Bypass HTTPS
77 Introduction to Threat Prevention Policies
78 Configure Backup for Management and Security Gateways
79 Add Mulitple GW in CP SMS
80 Introduction to Check Point VPNs - Site-to-Site and Remote Access VPNs
81 Implement Site-to-Site VPN Between Two Sites
82 Understand and Configure Check Point Logging
83 User Management and Identity Awareness
84 Expand knowledge and learn about ClusterXL
85 Understand howto Licensing Check Point Solutions and Products