دوره جامع فایروال و مدیریت پهنای باند (Forefront TMG 2010 – Kerio Control 9.x – pfSense Enterprise)
 

دوره جامع فایروال و مدیریت پهنای باند
Forefront Threat Management Gateway 2010
Kerio Control 9.x
PfSense Enterprise
پیش نیاز:MCSA

 

فایروال­ها که امروزه به دلیل اضافه شدن قابلیتهای متعدد دیگر با نام UTM به آنها اشاره می­شود، نقش بسیار مهمی را در شبکه­ های کامپیوتری داشته و کمتر شبکه ه­ای را می­ توان دید که حداقل از یک فایروال نرم ­افزاری و یا سخت­ افزاری استفاده نکند. در واقع می­توان گفت هر شبکه­ای که ارتباط اینترنت دارد، الزاما باید فایروال هم داشته باشد. در غیر اینصورت آن شبکه بسیار نا امن بوده و احتمال وارد شدن خسارات جبران ناپذیر بالا می­باشد. از این رو شرکت­های زیادی به تولید و عرضه UTM با امکانات و سطوح امنیتی متفاوت اقدام کرده­اند. در این دوره آموزشی با ۳ تا از برترین و پرکاربردترین UTMهایی که تا به امروز تولید شده­ اند بطور کامل و عملی آشنا می­ شویم.

اهداف اصلی یک (UTM (Unified Threat Management را می­ توان بطور کلی بصورت زیر بیان کرد:

– تامین امنیت شبکه و جلوگیری از نفوذ های غیر مجاز

– جلوگیری از ورود نرم افزارهای جاسوسی به داخل شبکه

– امکان برقراری ارتباط امن بین مراکز سازمان در یک بستر عمومی نظیر اینترنت

– امکان مدیریت بهینه منابع اینترنتی (پهنای باند) و افزایش بهره وری

– مدیریت یکپارچه ساختار اینترنت اعم از گزارش گیری های مختلف، مدیریت کاربران و… تحت واسط کاربری گرافیکی با قابلیت های متعدد

 

 

Forefront Threat Management Gateway 2010 :

  • Lesson 01 – Getting Started with Forefront Threat Management Gateway 2010 Training
  1. What We’re Building
  2. About the Course
  3. Before You Begin
  4. How to Use the Course
  • Lesson 02 – Lab Setup
  1. Physical Lab Configuration
  2. Lab Overview
  • Lesson 03 – The Course Scenario
  1. Current Protection Challenges
  2. Cost Structure
  3. Immediate Needs
  4. TMG 2010 Project Plan
  • Lesson 04 – Introduction to Forefront Threat Management Gateway 2010
  1. Scenario
  2. What is Forefront TMG?
  3. Licensing Forefront TMG
  4. Forefront 2010 Primary Features
  5. What’s New in Forefront TMG 2010?
  6. What’s New in Forefront TMG 2010 SP1?
  7. What’s New in Forefront TMG SP1 Update 1?
  8. TMG Editions Comparison
  9. Forefront TMG vs. UAG
  • Lesson 05 – Planning a Forefront TMG Deployment
  1. Scenario
  2. TMG Roles
  3. Software Requirements
  4. Hardware Requirements
  5. Deploying TMG to Virtual Machines
  6. TMG Network Topologies
  7. Workgroup vs. Domain Deployment
  8. DNS and TMG
  9. TMG Security Roles and Permissions
  • Lesson 06 – Installing Forefront TMG
  1. Scenario
  2. Lab Setup
  3. Pre-installation Steps
  4. Installing Forefront TMG 2010
  5. TMG Post-installation State
  • Lesson 07 – Forefront TMG Post-Installation Configuration Tasks
  1. Scenario
  2. Information Prior to Running Getting Started
  3. Using the Getting Started Wizard
  4. Running the Web Access Policy Wizard
  5. Enabling Minimum Access Needs
  6. Initial Communications Diagram
  7. Client Testing
  8. Get a Look at the TMG Console
  9. Managing Networks and Routing
  • Lesson 08 – Configuring TMG Client Software
  1. Scenario
  2. What Does the TMG Client Provide?
  3. Enabling Client Support in TMG
  4. Configuring Web Proxy Auto Discovery (WPAD)
  5. Installing the TMG Client
  6. TMG Client Installation Parameters
  • Lesson 09 – TMG Monitoring and Reporting
  1. Scenario
  2. The TMG Console Dashboard
  3. Configuring Alerts
  4. Real-Time Monitoring
  5. Windows Performance Monitor and TMG
  6. Performance Monitor Counters (from Microsoft)
  7. Using TMG Logs
  8. Running Reports
  • Lesson 10 – Forefront TMG Firewall Rules
  1. Scenario
  2. Managing TMG Networks
  3. Web Proxy Authentication Options
  4. Route vs. NAT
  5. Rule Types
  6. Rule Order and Operational Impact
  7. Firewall Policy Actions
  8. Rules Management
  9. TMG Log File Management
  • Lesson 11 – Configuring Intrusion Prevention
  1. Scenario
  2. Network Inspection System (NIS) Explained
  3. How NIS is Updated
  4. Managing NIS Settings
  5. Creating Exceptions to NIS Policy
  6. Testing NIS
  7. Configuring Behavioral Intrusion Detection
  • Lesson 12 – Configuring Malware Inspection
  1. Scenario
  2. What is Malware Inspection?
  3. How to Get Malware Inspection
  4. Malware Inspection License Considerations
  5. How Does Malware Protection Operate?
  6. Configuring Malware Inspection Policies
  7. Excluding Resources from Inspection Rules
  8. Updating Malware Definitions
  9. Optimizing the User Experience
  10. Content Delivery Options
  11. Microsoft Telemetry Service
  12. Configuring Malware Options in a Rule
  • Lesson 13 – Configuring HTTP
  1. Scenario
  2. HTTP Filter Purpose
  3. HTTP Filtering Common Scenarios
  4. HTTP Policy Settings
  5. Configuring HTTP Compression
  6. An Overview of HTTP DiffServ
  • Lesson 14 – Implementing HTTPS Inspection
  1. Scenario
  2. HTTPS Inspection Overview
  3. Enabling HTTPS Inspection
  4. Managing the HTTPS Inspection Certificate
  5. Generating a TMG HTTPSi Certificate
  6. Excluding Sites from HTTPS Inspection
  7. Managing Certificate Validation
  8. Managing User Notification
  9. Configure HTTPS Inspection
  • Lesson 15 – Configuring TMG URL Filtering
  1. Scenario
  2. Linking TMG to Corporate Policy and Compliance
  3. URL Filtering License Consideration
  4. How URL Filtering Works
  5. Managing Existing URL Filters
  6. Managing URL Filtering Settings
  7. Enabling SafeSearch Integration
  • Lesson 16 – Using TMG as a Web Cache/Proxy
  1. Scenario
  2. Managing Web Proxy Settings
  3. Why Cache Internet Traffic?
  4. TMG Caching Types
  5. Configuring Global Cache Settings
  6. Global Caching Considerations
  7. Cache Rule Properties
  • Lesson 17 – Publishing Servers
  1. Scenario
  2. Understanding Server Publishing
  3. Overview of Server Publishing
  4. Publishing and Network Configuration
  5. Server Publishing Components
  6. Publish an FTP Server
  7. Publishing a Server
  • Lesson 18 – Publishing Web Sites
  1. Scenario
  2. Creating a Web Publishing Rule
  3. Authentication Delegation
  4. Other Web Publishing Details
  5. Web Server Farm Considerations
  6. Publish the Public Intranet
  • Lesson 19 – Publishing Exchange
  1. Assumptions
  2. Generate and Satisfy Certificate Request
  • Lesson 20 – Implementing a VPN Service
  1. Scenario
  2. Understanding VPNs
  3. Understanding VPN Types
  4. VPN Considerations
  5. Enabling and Configuring TMG’s VPN Capability
  6. Configure VPN Client Properties
  7. Implementing a VPN Service
  • Lesson 21 – Bandwidth Management
  1. Scenario
  2. Installing Bandwidth Splitter on TMG Server
  3. Configuring Shaping Rules
  4. Configuring Quota for Users
  5. Monitoring Live Traffic

 

Kerio Control 9.x:

  • Lesson 1 – Deployment
  • Overview
  • Software Appliance
  • Virtual Appliance
  • Hardware Appliance NG100
  • Hardware Appliance NG300
  • Hardware Appliance NG500
  • Lesson 2 – Licensing and Software Activation
  1. License details
  2. License registration and activation
  3. Software Maintenance
  • Lesson 3 – Installation and Setup
  1. Installation overview
  2. * NG series appliances include a separate installation guide. 
  3. Setup parameters
  • Lesson 4 – Interfaces and Connectivity
  1. Internet Interfaces
  2. Trusted/Local Interfaces
  3. VPN interfaces
  4. Other interfaces
  5. Guest interfaces
  6. TCP/IP configuration
  7. VPN
  8. VLANs
  9. Internet link load balancing
  10. Guest network
  11. PPPoE, PPTP, and L2TP
  12. Interface properties
  13. Ethernet port configuration
  • Lesson 5 – Network Management
  1. Dynamic Host Configuration Protocol (DHCP) Server
  2. Domain Name System (DNS) forwarding
  • Lesson 6 – User Administration
  1. Directory Services
  2. Users
  3. Authentication
  • Lesson 7 – Traffic Rules
  1. General Concepts
  2. Rule conditions
  3. Rule actions
  4. Visual aids
  • Lesson 8 – Security and Content Filtering
  1. Antivirus
  2. Content Rules
  3. HTTPS filtering
  4. Intrusion Prevention System (IPS)
  • Lesson 9 – SSL Certificates
  1. General concepts
  2. Supported formats
  3. Certificate options
  • Lesson 10 – Bandwidth Management
  1. General concepts
  2. Bandwidth rules
  • Lesson 11 – Virtual Private Networking
  1. Prerequisites
  2. IPsec VPN Server
  3. Kerio VPN Server
  4. Kerio VPN client
  • Lesson 12 – Activity Monitoring and Reporting
  1. Traffic Charts
  2. Active Hosts
  3. Kerio Control statistics
  • Lesson 13 – Upgrades and Configuration Backup
  1. Upgrades
  2. Backup and Recovery
  • Lesson 14 – Troubleshooting
  1. Dashboard
  2. Logs
  3. Packet Capture
  4. Debugging
  5. System Health
  6. SNMP Monitoring
  7. Password Recovery and Factory Reset
  8. IP Tools

PfSense Enterprise Training Course Outline:

  • Lesson 1 – pfSense Overview
  • Lesson 2 – Obtaining pfSense
  • Lesson 3 – Building Install Media
  • Lesson 4 – Installing pfSense
  • Lesson 5 – Initial Configuration
  • Lesson 6 – Interfaces and Vlans
  • Lesson 7 – Filtering Wan Traffic
  • Lesson 8 – Filtering Lan Traffic
  • Lesson 9 – Scheduling Filter Rules
  • Lesson 10 – Dynamic NAT
  • Lesson 11 – ۱to1 Nat Mapping
  • Lesson 12 – Port Forwarding
  • Lesson 13 – Site to Site VPN
  • Lesson 14 – Site to Site Open VPN client
  • Lesson 15 – Remote Access Open VPN
  • Lesson 16 – Site to Site IPsec
  • Lesson 17 – DHCP
  • Lesson 18 – pfSense Dns Resolver
  • Lesson 19 – pfSense Captive Portal
  • Lesson 20 – pfSense High Availability
  • Lesson 21 – Routing Protocols
  • Lesson 22 – pfSense Home Screen Widgets
  • Lesson 23 – Diagnostic Tools
  • Lesson 24 – BandwithD and ntopng
  • Lesson 25 – Updating pfSense
  • Lesson 26 – pfSense Popular Packages
  • Lesson 27 – Selecting Hardware


دسته بندی ها: امنیت

دوره های مرتبط

سخنران ها (استاد ها)
  • ساختمان 1.خیابان ارم.نبش کوچه 2
  • 32251000 داخلی 128

قیمت

795.000 تومان
ثبت نام

جستجوی دوره

تنها نمایندگی موسسه CIW در جنوب ایران