Online Training

Cyber Security Training Programs
Be a certified Security Professional

We Provide Lab Practices on Real Time Devices

Popular Courses

Cisco Certified Network Associate ( CCNA Course ) is an unavoidable certification if you wish to start your career in Networking Domain. Course includes basic understanding of concepts of OSI & TCP-IP Protocol Stack, Switching & Routing, Access Control List, Network Address Translation and WAN. Course includes brief introductory Lab expertise.

Upon completion of which one can target the career pathways to become:

  • Network technician
  • Support engineer
  • Network administrator
  • Network Designer

Duration:

  • 60 hours

Prerequisites:

  • Basic computer literacy
  • Basic PC operating system navigation skills
  • Basic Internet usage skills
  • Basic IP address knowledge
  • Good understanding of network fundamentals

Course Description:

  • Network Description & Network Design & Planning
  • Network Devices & Networking Technologies
  • OSI Model (Open System Interconnection)  & TCP/IP Model
  • Ipv4 & Ipv6
  • IP addressing & Subnet Masks
  • IP Services & DHCP
  • DNS & DHCP & NAT
  • LAN Switching Technology
  • VLAN & its Advantages
  • Security Configurations and verify network device security features 
  • WAN Technologies
  • Cisco Router Introduction 
  • IP Routing
  • Dynamic Protocols & Dynamic Routing 
  • RIP
  • OSPF ( Open Shortest Path First )
  • EIGRP (Enhanced Interior Gateway Routing Protocol)
  • HelpfulCommand use in Live Environment
  • How to manage Cisco devices
  • Packet Filtering via ACL
  • NTP
  • Advance Topics

Overview

A CCNA Security certification will enable you to develop a security infrastructure using Cisco network devices, acquire skills to install and monitor network devices, and recognize and control threats to the security structure. This CCNA Security course on latest version IINS v3 strives to deliver the core security concepts, VPN encryption, understand the secure access management, firewall, intrusion prevention, endpoint security along with email and web security. Participants will learn to install, troubleshoot, and monitor the secure networks to maintain the confidentiality, availability of devices and data and integrity through this CCNA Security certification training.

After completing the CCNA Security training you will acquire skills to help you have a better understanding of the security threats and learn how to take preventive steps to stop such threats.

Who should do a CCNA Security Training certification?

CCNA Security training and certification is beneficial for the following professionals:

  • Network Security Specialist
  • Network Engineers
  • Network Security Administrator
  • Network Security Support Engineer

Duration:

  • 60 hours

Course Description:

COMMON SECURITY THREATS

SECURITY AND CISCO ROUTERS

DESCRIBE IPV4 TO IPV6 TRANSITION

AAA ON CISCO DEVICES

DESCRIBE AAA

IOS ACLS

DESCRIBE CONSIDERATIONS WHEN BUILDING ACLS

IMPLEMENT IP ACLS TO MITIGATE THREATS IN A NETWORK

SECURE NETWORK MANAGEMENT AND REPORTING

IMPLEMENT SECURE NETWORK MANAGEMENT

LAYER 2 ATTACKS

DESCRIBE VLAN SECURITY

IMPLEMENT VLANS AND TRUNKING

IMPLEMENT SPANNING TREE

CISCO FIREWALL TECHNOLOGIES

DESCRIBE STATEFUL FIREWALLS

DESCRIBE THE TYPES OF NAT USED IN FIREWALL TECHNOLOGIES

IMPLEMENT ZONE BASED FIREWALL USING CCP

IMPLEMENT THE CISCO ADAPTIVE SECURITY APPLIANCE (ASA)

IMPLEMENT NAT AND PAT

CISCO IPS

VPN TECHNOLOGIES

Overview

A CCNA Security certification will enable you to develop a security infrastructure using Cisco network devices, acquire skills to install and monitor network devices, and recognize and control threats to the security structure. This CCNA Security course on latest version IINS v3 strives to deliver the core security concepts, VPN encryption, understand the secure access management, firewall, intrusion prevention, endpoint security along with email and web security. Participants will learn to install, troubleshoot, and monitor the secure networks to maintain the confidentiality, availability of devices and data and integrity through this CCNA Security certification training.

After completing the CCNA Security training you will acquire skills to help you have a better understanding of the security threats and learn how to take preventive steps to stop such threats.

Who should do a CCNA Security Training certification?

CCNA Security training and certification is beneficial for the following professionals:

  • Network Security Specialist
  • Network Engineers
  • Network Security Administrator
  • Network Security Support Engineer

Duration:

  • 60 hours

Course Description:

COMMON SECURITY THREATS

SECURITY AND CISCO ROUTERS

DESCRIBE IPV4 TO IPV6 TRANSITION

AAA ON CISCO DEVICES

DESCRIBE AAA

IOS ACLS

DESCRIBE CONSIDERATIONS WHEN BUILDING ACLS

IMPLEMENT IP ACLS TO MITIGATE THREATS IN A NETWORK

SECURE NETWORK MANAGEMENT AND REPORTING

IMPLEMENT SECURE NETWORK MANAGEMENT

LAYER 2 ATTACKS

DESCRIBE VLAN SECURITY

IMPLEMENT VLANS AND TRUNKING

IMPLEMENT SPANNING TREE

CISCO FIREWALL TECHNOLOGIES

DESCRIBE STATEFUL FIREWALLS

DESCRIBE THE TYPES OF NAT USED IN FIREWALL TECHNOLOGIES

IMPLEMENT ZONE BASED FIREWALL USING CCP

IMPLEMENT THE CISCO ADAPTIVE SECURITY APPLIANCE (ASA)

IMPLEMENT NAT AND PAT

CISCO IPS

VPN TECHNOLOGIES

Overview

A CCNA Security certification will enable you to develop a security infrastructure using Cisco network devices, acquire skills to install and monitor network devices, and recognize and control threats to the security structure. This CCNA Security course on latest version IINS v3 strives to deliver the core security concepts, VPN encryption, understand the secure access management, firewall, intrusion prevention, endpoint security along with email and web security. Participants will learn to install, troubleshoot, and monitor the secure networks to maintain the confidentiality, availability of devices and data and integrity through this CCNA Security certification training.

After completing the CCNA Security training you will acquire skills to help you have a better understanding of the security threats and learn how to take preventive steps to stop such threats.

Who should do a CCNA Security Training certification?

CCNA Security training and certification is beneficial for the following professionals:

  • Network Security Specialist
  • Network Engineers
  • Network Security Administrator
  • Network Security Support Engineer

Duration:

  • 60 hours

Course Description:

COMMON SECURITY THREATS

SECURITY AND CISCO ROUTERS

DESCRIBE IPV4 TO IPV6 TRANSITION

AAA ON CISCO DEVICES

DESCRIBE AAA

IOS ACLS

DESCRIBE CONSIDERATIONS WHEN BUILDING ACLS

IMPLEMENT IP ACLS TO MITIGATE THREATS IN A NETWORK

SECURE NETWORK MANAGEMENT AND REPORTING

IMPLEMENT SECURE NETWORK MANAGEMENT

LAYER 2 ATTACKS

DESCRIBE VLAN SECURITY

IMPLEMENT VLANS AND TRUNKING

IMPLEMENT SPANNING TREE

CISCO FIREWALL TECHNOLOGIES

DESCRIBE STATEFUL FIREWALLS

DESCRIBE THE TYPES OF NAT USED IN FIREWALL TECHNOLOGIES

IMPLEMENT ZONE BASED FIREWALL USING CCP

IMPLEMENT THE CISCO ADAPTIVE SECURITY APPLIANCE (ASA)

IMPLEMENT NAT AND PAT

CISCO IPS

VPN TECHNOLOGIES

CISCO ASA

This course features over  30  hours of training and is designed for network engineers who want to quickly get up to speed on deploying and supporting Cisco Adaptive Security Appliance (ASA) Firewalls in production environments. This class is also applicable to candidates for Cisco security certifications such as CCNA Security, CCNP Security, and CCIE Security. This class takes a hands-on approach to implementing technologies such as stateful firewall filtering, deep packet inspection, DoS prevention, and IPsec & SSL VPN termination on both the Cisco ASA 8.x and 9.x Command Line Interface (CLI) and the Adaptive Security Device Manager (ASDM) GUI interface. Students will follow the instructor through the detailed configuration, verification, and troubleshooting of ASA 5500 series firewalls, and also learn the advanced theory behind topics such as stateful firewall filtering and IPsec VPNs.

Duration:

  • 30 hours

Prerequisites:

  • Strong Knowledge of CCNA

Course Summary:

  • Implementing ASA Firewalls Introduction
  • ASA Access-list
  • ASA inspection  policy
  • ASA Initialization & Routed Firewall
  • ASA Network Address Translation (NAT)
  • ASA Transparent Firewall
  • ASA Virtual Firewalls (Multiple Context Mode)
  • ASA Device Manager (ASDM) Management
  • ASA Site-to-Site IPsec VPNs
  • ASA Remote Access IPsec VPNs
  • ASA Remote Access SSL VPNs
  • ASA High Availability with Failover

 

Overview

The CCNA Cyber Ops Certification is the first step in acquiring skills and equipping oneself to work with the SOC teams. The online security of network from cyber attackers has very great importance. The IT as well as non-IT industries in modern era are exposed to online threats. As we continuously face Cyber Security breaches throughout the world, there is huge need of effective responding to Security incidents.

Here comes CCNA Cyber Ops Certifications that will prepare you for a Career in Cyber Security analysis responding to the threats.

An estimated need exists for 2 Million Cyber security professionals by 2019 in which Cisco Certified engineers will have an important role to impart. The Certifications helps Security personnel get equipped with ability to monitor security systems and detect online attacks.

Who should do CCNA Cyber Ops training?

  • Anyone interesting in starting a career in SOC.
  • Anyone planning to get CCNA Cyber Ops certification

Duration :

30 Hours

Course Description :

  • Network Concepts
  • Security Concepts
  • Cryptography
  • Host Based Analysis
  • Security Monitoring
  • Attack Methods
  • Endpoint Threat Analysis and Computer Forensics
  • Network Intrusion Analysis
  • Incident Response
  • Data and Event Analysis
  • Incident Handling

Cisco Firepower 6.x with ISE-2

Learn how to administrate a Cisco Firepower with Firepower Threat Defense system! Understand Cisco’s Threat-Focused Next Generation Firewall (NGFW) with Optiflow Processing.

The Cisco NGFW/IPS is the the industry’s best security product, so now is the time to up your skills with with Cisco’s Firepower technologies.

Duration:

  • 30 Hours

Prerequisites:

  • Strong Knowledge of TCP/IP Protocols
  • CISCO ASA Firewall

Course Summary:

 Lab Exercise 1: Initial SFR Configuration

◦ Task 1.1: Perform initial SFR configuration

◦ Task 1.2: Explore on-box management capabilities

Lab Exercise 2: Basic Policy Configuration

◦ Task 2.1: Create an access policy hierarchy

◦ Task 2.2: Register devices

◦ Task 2.3: Configure Firepower settings

◦ Task 2.4: Configure network discovery

◦ Task 2.5: Redirect traffic to the SFR

◦ Task 2.6: Test the policy configuration

Lab Exercise 3: Security Intelligence

◦ Task 3.1: Upload network, URL and DNS lists

◦ Task 3.2: Configure a DNS sinkhole

◦ Task 3.3: Configure Security Intelligence in an access policy

◦ Task 3.4: Test the Security Intelligence configuration

Lab Exercise 4: Snort and OpenAppID

◦ Task 4.1: Configure a network analysis policy

◦ Task 4.2: Configure an intrusion policy

◦ Task 4.3: Create a custom application detector

◦ Task 4.4: Modify the ASASFR Access Policy

◦ Task 4.5: Test Snort and Open AppID

Lab Exercise 5: SSL Decryption

◦ Task 5.1: Upload certificates and keys

◦ Task 5.2: Configure an SSL policy

◦ Task 5.3: Test SSL decryption

Lab Exercise 6: File Policy Configuration

◦ Task 6.1: Create a file policy

◦ Task 6.2: Deploy the file policy

◦ Task 6.3: Test the file policy

Lab Exercise 7: Identity

◦ Task 7.1: Configure a realm

◦ Task 7.2: Configure Cisco Firepower User Agent integration

◦ Task 7.3: Configure the ASA for captive portal
◦ Task 7.4: Create an identity policy
◦ Task 7.5: Modify an access control policy to utilize authentication
◦ Task 7.6: Test authentication
◦ Task 7.7: Configure ISE integration

Lab Exercise 8: Domains
◦ Task 8.1: Create and configure domains
◦ Task 8.2: Enforce policy inheritance
◦ Task 8.3: Configure leaf domains
◦ Task 8.4: Configure domain specific role based access control

Cisco Firepower 6.x with ISE-2

Learn how to administrate a Cisco Firepower with Firepower Threat Defense system! Understand Cisco’s Threat-Focused Next Generation Firewall (NGFW) with Optiflow Processing.

The Cisco NGFW/IPS is the the industry’s best security product, so now is the time to up your skills with with Cisco’s Firepower technologies.

Duration:

  • 30 Hours

Prerequisites:

  • Strong Knowledge of TCP/IP Protocols
  • CISCO ASA Firewall

Course Summary:

 Lab Exercise 1: Initial SFR Configuration

◦ Task 1.1: Perform initial SFR configuration

◦ Task 1.2: Explore on-box management capabilities

Lab Exercise 2: Basic Policy Configuration

◦ Task 2.1: Create an access policy hierarchy

◦ Task 2.2: Register devices

◦ Task 2.3: Configure Firepower settings

◦ Task 2.4: Configure network discovery

◦ Task 2.5: Redirect traffic to the SFR

◦ Task 2.6: Test the policy configuration

Lab Exercise 3: Security Intelligence

◦ Task 3.1: Upload network, URL and DNS lists

◦ Task 3.2: Configure a DNS sinkhole

◦ Task 3.3: Configure Security Intelligence in an access policy

◦ Task 3.4: Test the Security Intelligence configuration

Lab Exercise 4: Snort and OpenAppID

◦ Task 4.1: Configure a network analysis policy

◦ Task 4.2: Configure an intrusion policy

◦ Task 4.3: Create a custom application detector

◦ Task 4.4: Modify the ASASFR Access Policy

◦ Task 4.5: Test Snort and Open AppID

Lab Exercise 5: SSL Decryption

◦ Task 5.1: Upload certificates and keys

◦ Task 5.2: Configure an SSL policy

◦ Task 5.3: Test SSL decryption

Lab Exercise 6: File Policy Configuration

◦ Task 6.1: Create a file policy

◦ Task 6.2: Deploy the file policy

◦ Task 6.3: Test the file policy

Lab Exercise 7: Identity

◦ Task 7.1: Configure a realm

◦ Task 7.2: Configure Cisco Firepower User Agent integration

◦ Task 7.3: Configure the ASA for captive portal
◦ Task 7.4: Create an identity policy
◦ Task 7.5: Modify an access control policy to utilize authentication
◦ Task 7.6: Test authentication
◦ Task 7.7: Configure ISE integration

Lab Exercise 8: Domains
◦ Task 8.1: Create and configure domains
◦ Task 8.2: Enforce policy inheritance
◦ Task 8.3: Configure leaf domains
◦ Task 8.4: Configure domain specific role based access control

Check Point Certified Security Administrator

CCSA R77.30/ R80.10

Check Point Security Administration R77 provides an understanding of the basic concepts and skills necessary to configure Check Point Security Gateway and Management Software Blades. During this course, you will configure a Security Policy and learn about managing and monitoring a secure network, upgrading and configuring a Security Gateway and implementing a virtual private network.

Duration:

  • 30 Hours

Prerequisites:

  • Persons attending this course should have general knowledge of TCP/IP, and working knowledge of Windows, UNIX, network technology and the internet.

Course summary:

  • Module 1:Introduction to Check Point Architecture
  • Module 2:Security Policy Management
  • Module 3:Check Point Security Solutions
  • Module 4:Traffic Visibility
  • Module 5:Basic Concepts of VPN
  • Module 6:Managing User’s Access
  • Module 7:Working with Cluster XL
  • Module 8:Administrator Task Implementation
  • Module 9:SmartEvent Reports
  • Customizing application delivery with iRules and local traffic policies

Palo Alto Networks certification offers a mastery over wide set of enterprise-level next-generation firewalls, with a varied range of security features for your network. Palo Alto Networks next-generation firewalls are designed, architected and implemented to enable applications safely and prevent them from modern threats.

Palo Alto training course allows participants to get trained and equip themselves with latest skills and tools necessary to gain expertise on next generation firewalls. They learn to configure and manage firewalls, Mitigate threats with Traps and Wild Fire, manage multiple firewalls with Panorama as well and much more.

The course has been designed in a manner to help engineers in getting acquainted with the skills required to understand, support, troubleshoot and manage Palo Alto Networks Next-Generation Security Platform products in their care.

The training is imparted by accredited trainers with real world experience. We offer Hands on labs to prepare you in and for the real environment. The course becomes inevitable if you want to gain expertise needed to protect your organization from advanced Cyber Security attacks and threats.

Our delivery formats are convenient as students have a choice to opt for classroom training or virtual training. We don’t need to speak much as our high levels of accreditation and training credentials speak for themselves.

Course Objectives:

Upon course completion, participants would be able to configure, install, and administer Palo Alto Networks firewall. Students would get trained on the configuration steps for the networking, security, logging, and reporting features of the PAN-OS, and the configuration steps for VPN & High Availability.

Additionally they get to learn:

  • How to use GUI and use CLI
  • How to set Up Authentication Profiles
  • How to Create a Local User Database
  • Configuring RADIUS Server Settings
  • Comprehending Antivirus and anti-spyware
  • Defining IKE Gateways and setting up IPSec Tunnels and VPNs
  • Defining IPSec Crypto Profiles and IKE Crypto Profiles
  • Defining Alarm Log Settings and scheduling Log Exports
  • Configuring Active/Active HA
  • Comprehending Panorama
 

FortiGate I

In this class, you will learn how to use basic FortiGate UTM. In interactive labs, you will explore firewall policies, basic VPNs, virus detection, web filtering, application control, user authentication, and more. These administrative fundamentals will provide you with a solid understanding of how to integrate basic network security.

Duration:

  • 30 Hours

Prerequisites:

  • Strong Knowledge of TCP/IP Protocols
  • Basic Knowledge of Firewalls

Course Summary:

    • Module-1: Introduction to fortinet
    • Module-2: Firewall Policies
    • Module-3: Authentication
    • Module-4: SSL VPN
    • Module-5: Basic IPSEC VPN
    • Module-6: Antivirus
    • Module-7: Explicit Proxy
    • Module-8: Webfilter
    • Module-9: Application Control
    • Module-10: Logging & Monitoring

________________________

FortiGate II

In this class, you will learn advanced FortiGate networking and security. Topics include features commonly in complex or larger enterprise/MSSP networks, such as advanced routing, transparent mode, redundant infrastructure, advanced IPsec VPN, IPS, SSO, data leak prevention, diagnostics, and fine-tuning performanc

Duration:

  • 30 Hours

Prerequisites:

  • Completion of Fortigate-I

Course Summary:

    • Module-1: Routing
    • Module-2: Virtual Domains
    • Module-3: Transparent Mode
    • Module-4: High Availability
    • Module-5: Advance IPSEC VPN
    • Module-6: Intrusion Prevention system
    • Module-7: FSSO
    • Module-8: Certificate Operations
    • Module-9: Data Leakage Prevention
    • Module-10: Diagnostics
    • Module-11: Hardware Acceleration
    • Module-12: IPv6

F5 LTM BIG IP

Duration:

  • 30 Hours

Prerequisites:

  • Strong Knowledge of Network Engineering

Course Topics

Module-1: BIG-IP initial setup

Module-2: A review of BIG-IP local traffic Configuration objects

Module-3: Using dynamic load balancing methods

Module-4: Modifying traffic behavior with persistence

Module-5: Processing traffic with virtual servers

Module-6: Processing traffic with SNATs

Module-7: Modifying traffic behavior with profiles

Module-8: Deploying application services with iApps

Module-9: Customizing application delivery with iRules and local traffic policies

Module-10: Configuring high availability

Splunk Fundamentals

Duration:

  • 30 Hours

Prerequisites:

  • Strong Knowledge of Network Engineering

Course Topics

Module-1: Introduction to Splunk’s interface

Module-2:Basic searching

Module-3:Using fields in searches

Module-4:Search fundamentals

Module-5:Transforming commands

Module-6:Creating reports and dashboards

Module-7:Datasets

Module-8:The Common Information Model (CIM)

Module-9:Creating and using lookups

Module-10:Scheduled Reports

Module-11:Alerts

Module-12:Using Pivot

Industry Specific Courses

You Will Learn Desktop Engineer Duties and Responsibilities:

Desktop Engineers complete a wide variety of tasks to troubleshoot and fix computer problems. Based on our analysis of Desktop Engineer job descriptions, you will learn main Desktop Engineer duties and responsibilities.

·         Creating Software Images for Endpoint Devices

·         Troubleshooting Software and Hardware Issues

·         Develop and Implement a Software Update Schedule

·         Ensure Network Security is Up to Date

·         Communicate With Users to Identify Issues and Explain Solutions

·         Identifying cause of and resolving application issues

·         Identifying cause of and resolving networking issues

·         Managing and maintaining systems that run Windows client Operating Systems

·         Supporting phone / smart mobile devices and users

Tools:

·         Windows platforms

·         Anti-virus

·         Microsoft active directory

·         Cloud platform

·         Computer periphery

Networking Topics will be covered

·         Introduction of osi model

·         Introduction of TCP/IP

·         TCP/IP Tutorial

·         IPv4/ IPv6 Tutorial

·         DHCP

·         DNS

·         NAT

·         VPNs

Duration:

  • 60 hours

Prerequisites:

  • Basic computer literacy
  • Basic PC operating system navigation skills
  • Basic Internet usage skills
  • Basic IP address knowledge

Network Engineer

You will learn Network Engineers roles and responsibilities.

Network engineers work with a company’s computer network, using information technology to make network systems for all employees to use. These data networks can include local area networks (LANs), wide area networks (WANs), intranets and extranets.

Network Engineer course will cover the following:

·         Establishes networking environment by designing system configuration; directing system installation; defining, documenting, and enforcing system standards.

·         Designing and implementing new network solutions and/or improving the efficiency of current networks

·         Installing, configuring and supporting network equipment including routers, proxy servers, switches, WAN accelerators, DNS and DHCP

·         Procuring network equipment and managing subcontractors involved with network installation

·         Configuring firewalls, routing and switching to maximise network efficiency and security

·         Maximising network performance through ongoing monitoring and troubleshooting

·         Investigating faults in the network

·         Updating network equipment to the latest firmware releases

·         Maximizes network performance by monitoring performance; troubleshooting network problems and outages; scheduling upgrades; collaborating with network architects on network optimization.

·         Secures network system by establishing and enforcing policies; defining and monitoring access.

·         Accomplishes information systems and organization mission by completing related results as needed.

·         Reporting network operational status by gathering, prioritizing information; managing projects.

Network Engineer Skills

 LAN Knowledge, Proxy Servers, Networking Knowledge, Network Design and Implementation, Network Troubleshooting, Network Hardware Configuration, Network Performance Tuning

Duration:

60 hours

Prerequisites:

Strong knowledge of Desktop engineer

 

Overview

The CCNA Cyber Ops Certification is the first step in acquiring skills and equipping oneself to work with the SOC teams. The online security of network from cyber attackers has very great importance. The IT as well as non-IT industries in modern era are exposed to online threats. As we continuously face Cyber Security breaches throughout the world, there is huge need of effective responding to Security incidents.

Here comes CCNA Cyber Ops Certifications that will prepare you for a Career in Cyber Security analysis responding to the threats.

An estimated need exists for 2 Million Cyber security professionals by 2019 in which Cisco Certified engineers will have an important role to impart. The Certifications helps Security personnel get equipped with ability to monitor security systems and detect online attacks.

 

Who should do CCNA Cyber Ops training?

  • Anyone interesting in starting a career in SOC.
  • Anyone planning to get CCNA Cyber Ops certification

Duration :

30 Hours

Course Description :

  • Network Concepts
  • Security Concepts
  • Cryptography
  • Host Based Analysis
  • Security Monitoring
  • Attack Methods
  • Endpoint Threat Analysis and Computer Forensics
  • Network Intrusion Analysis
  • Incident Response
  • Data and Event Analysis
  • Incident Handling

Certification Courses

Check Point Certified Security Administrator

CCSA R77.30 / R 80.10

Check Point Security Administration R77 provides an understanding of the basic concepts and skills necessary to configure Check Point Security Gateway and Management Software Blades. During this course, you will configure a Security Policy and learn about managing and monitoring a secure network, upgrading and configuring a Security Gateway and implementing a virtual private network.

Duration:

  • 30 Hours

Prerequisites:

  • Persons attending this course should have general knowledge of TCP/IP, and working knowledge of Windows, UNIX, network technology and the internet.

Course summary:

  • Module 1:Introduction to Check Point Architecture
  • Module 2:Security Policy Management
  • Module 3:Check Point Security Solutions
  • Module 4:Traffic Visibility
  • Module 5:Basic Concepts of VPN
  • Module 6:Managing User’s Access
  • Module 7:Working with Cluster XL
  • Module 8:Administrator Task Implementation
  • Module 9:SmartEvent Reports
  • Customizing application delivery with iRules and local traffic policies

Check Point Certified Security Expert

CCSE R77.30 / R 80.10

Check Point Security Engineering is an advanced 3-day course that teaches how to effectively build, modify, deploy and troubleshoot Check Point Security systems on the Gaia OS. We will study firewall processes and take a close look at user and kernel processing and Stateful Inspection. Labs include configuring security gateways, implementing VPNs, and performing advanced troubleshooting tasks on the firewall.

Duration:

  • 30 Hours

Prerequisites:

  • Strong Knowledge of CCSA

Course Summary:

  • Advance Firewall
  • Command Line Administration
  • Advance VPN
  • UTM Features
  • Advance UTM Features
  • IDS/IPS
  • QOS
  • CLUSTERING
  • Reporting

 

FortiGate I

In this class, you will learn how to use basic FortiGate UTM. In interactive labs, you will explore firewall policies, basic VPNs, virus detection, web filtering, application control, user authentication, and more. These administrative fundamentals will provide you with a solid understanding of how to integrate basic network security.

Duration:

  • 30 Hours

Prerequisites:

  • Strong Knowledge of TCP/IP Protocols
  • Basic Knowledge of Firewalls

Course Summary:

    • Module-1: Introduction to fortinet
    • Module-2: Firewall Policies
    • Module-3: Authentication
    • Module-4: SSL VPN
    • Module-5: Basic IPSEC VPN
    • Module-6: Antivirus
    • Module-7: Explicit Proxy
    • Module-8: Webfilter
    • Module-9: Application Control
    • Module-10: Logging & Monitoring

______________________________

FortiGate II

In this class, you will learn advanced FortiGate networking and security. Topics include features commonly in complex or larger enterprise/MSSP networks, such as advanced routing, transparent mode, redundant infrastructure, advanced IPsec VPN, IPS, SSO, data leak prevention, diagnostics, and fine-tuning performanc

Duration:

  • 30 Hours

Prerequisites:

  • Completion of Fortigate-I

Course Summary:

    • Module-1: Routing
    • Module-2: Virtual Domains
    • Module-3: Transparent Mode
    • Module-4: High Availability
    • Module-5: Advance IPSEC VPN
    • Module-6: Intrusion Prevention system
    • Module-7: FSSO
    • Module-8: Certificate Operations
    • Module-9: Data Leakage Prevention
    • Module-10: Diagnostics
    • Module-11: Hardware Acceleration
    • Module-12: IPv6

CCNA

CCNA Security

CCNP

CCNP Security

CCIE

Cisco ISE2

Cisco Firepower

Cisco SD-WAN

Elementor it's the most advanced drag & drop page builder. Any theme, any page.

I am text block. Click edit button to change this text. Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Designers

Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo. I am text block. edit to change text. I am text block. Click edit button to change this text. Lorem ipsum dolor sit amet, consectetur adipiscing edit. Lorem ipsum dolor sit amet, consectetur adipiscing elit. 

  • Tips & Tutorials
  • Inspiration gallery
  • Site of the day

Developers

I am text block. Click edit button to change this text. Lorem ipsum dolor sit amet, consectetur adipiscing edit. Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo. I am text block. edit to change text.

  • Add-ons & extensions
  • GitHub project
  • API for developers

Simple time management

Click edit button to change this text. Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

the power of scaling

Click edit button to change this text. Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

coding out of the box

Click edit button to change this text. Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

fall in love with our features

Real time stats

Click edit button to change this text. Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec mattis, pulvinar dapibus leo.

Multilingual & translatable

Click edit button to change this text. Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec mattis, pulvinar.

Less plugins needed

Click edit button to change this text. Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec mattis, pulvinar dapibus leo.

Amazingly responsive

Click edit button to change this text. Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec mattis, pulvinar dapibus leo.

Community builder

Click edit button to change this text. Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec mattis, pulvinar dapibus leo.

Easy to use interface

Click edit button to change this text. Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec mattis, pulvinar dapibus leo.

Birthdays

Click edit button to change this text. Lorem ipsum dolor sit amet, adipelit. Ut elit tellus,

Special Events

Click edit button to change this text. Lorem ipsum dolor sit amet, adipelit. Ut elit tellus,

Breakfast

Click edit button to change this text. Lorem ipsum dolor sit amet, adipelit. Ut elit tellus,

Open House

Click edit button to change this text. Lorem ipsum dolor sit amet, adipelit. Ut elit tellus,

Restaurants

Click edit button to change this text. Lorem ipsum dolor sit amet, adipelit. Ut elit tellus,

Takeaway

Click edit button to change this text. Lorem ipsum dolor sit amet, adipelit. Ut elit tellus,