Duration : 80 Hrs     |    Cost : Rs.10,000 (Rs.2000 off for Alumni)     |    Difficulty : Intermediate     Enroll
Duration : 80 Hrs
Cost : Rs.10,000 (Rs.2000 off for Alumni)
Difficulty : Intermediate

Enroll

Basic Network Attacks with Kali Linux

# Topics Discussed
1 DHCP Starvation
2 Rouge DHCP Server
3 MITM (Man in the Middle Attack) aka ARP Poisoning
4 DNS Spoofing with MITM

Working on Cisco IOS

# Topics Discussed
5 Configuring Extended ACLs
6 Understanding Network Address Translation (NAT)
7 Configuring NAT and PAT
8 Static NAT and Port Forwarding
9 Working on Reflexive ACL

CRYPTOGRAPHY

# Topics Discussed
10 Understanding Confidentiality, Integrity, Non-Repudiation and Authenticity
11 Practicing AES Symmetric Key Encryption
12 Practicing RSA Asymmetric Key Encryption
13 Practicing Diffie-Helman Asymmetric Key Encryption
14 Practicing HASH and HMAC
15 Practicing Digital Signature
16 Understanding and Working on Certificate Authority

PROXY SERVERS

# Topics Discussed
17 Understanding the purpose of Proxy Servers
18 Installing and Configuring Squid Proxy Server - Explicit Proxy
19 Practing URL filtering, File Blocking on Proxy Server
20 Setting Up Transparent Proxy Server
21 SSL Interception on Squid Proxy Server

PALOALTO

# Topics Discussed
22 PaltoAlto - Initial Config
23 Understanding Zone Based Firewall Concepts and Creating Security Zones
24 Configuring Security policies between zones
25 DHCP Server - DNS Server - Default Route
26 Configuring NAT - Dynamic NAT and Static NAT - Int Mgmt Profile
27 PA Service Route - Understanding Port Tunneling - Layer 7 Application Filtering
28 Application Category - High to Low Risk Applications - Application Group - Application Filter
29 Creating Custom Applications
30 Configuring URL Filtering - Custom URL Category - External Dynamic Lists
31 SSL Decryption( Trusted and Untrusted Certificate )
32 Exclude SSL Decryption for Financial Sites
33 Configuring Geo Based ACL (Inbound & Outbound) and Time Based ACL
34 File type Blocking - Content Awareness
35 Marking Tags - Import and Export Configs
36 DDOS Protection - Threat Prevention Policy
37 Working of Traceroute - Purpose of Having TTL - ARP - Proxy ARP
38 VLAN Concepts - VLAN on Cisco IOS - Inter VLAN Routing
39 PA Licensing and Monitoring
40 Configuring Layer 3 Sub Interfaces on PA
41 Configuring Floating Route with Path Monitoring
42 Equal Cost Multi Path Load Balancing Technique
43 Policy Based Forwarding - PFB
44 Quality Of Service (QOS) - Speed Limiting with Applications
45 Captive Portal
46 User ID integration with AD
47 Application Control Override - ACC - Data Leakage
48 Deployment Modes - Vwire - TAP - Layer 2
49 High Availability(active/standby)
50 High Availability(active/active)
51 High Availability(active/active) - Floating IP
52 Understading Site-2-Site and Remote Access VPN
53 Configuring Site-2-Site VPN on Cisco Router
54 Understading NAT Traversal
55 PA and ASA Site-2-Site IPSEC VPN ( IKEv1 and IKEv2 )
56 Remote Access & Clientless SSL VPN - Global Protect
57 NAT Traversal in Site-to-Site VPN
58 Panorama in PaloAlto ( Only Theory )

CHECKPOINT R80.10

# Topics Discussed
59 Install and Configure Check Point GAiA OS R80.10
60 Run the First Time Wizard on GAiA OS R80.10
61 CheckPoint Standalone and Distributed Architecture
62 CheckPoint Security Gateway and Security Management Server
63 Configure Users and Roles. Start Working on CLI Clish and Expert Mode
64 Secure Internal Communication (SIC)
65 Objects, Security Zones and Anti-Spoofing.
66 Understand Rules and Configure a Typical Rule Base
67 Policy Types. Working with Policy Packages
68 Configure Management and Stealth Rules
69 Define General Traffic Rules - DNS, HTTP, DMZ
70 Define Cleanup Rule. Organize Rule Base with Sections
71 Understand Network Address Translation (NAT)
72 Configure Hide NAT
73 Configure Static NAT
74 Configure a Basic Access Control Policy
75 Implement HTTPS Inspection Policy
76 Configure Advanced Access Control Policies.
77 Inline Layers
78 Geo Based ACL and Time Based ACL
79 Application Control and URL Filtering. Content Awareness.
80 Speed Limiting and Bypass HTTPS
81 Introduction to Threat Prevention Policies
82 Configure Backup for Management and Security Gateways
83 Add Mulitple GW in CP SMS
84 Introduction to Check Point VPNs - Site-to-Site and Remote Access VPNs
85 Implement Site-to-Site VPN Between Two Sites
86 Understand and Configure Check Point Logging
87 User Management and Identity Awareness
88 Expand knowledge and learn about ClusterXL
89 Understand howto Licensing Check Point Solutions and Products

FORTIGATE

Yet to Update