How to Build Secure Perimeters with Firewalls, VPNs
and Prevention Tools
by Michael Angelo Vien
Description
This two-day class focuses on creating firewall implementations that secure your permiter and protect your information resources.
You will review numerous commercial and freeware firewalls, examine Best Practices for protecting DNS services, HTTP, and SMTP. You will explore proven strategies for defending your networks against unauthorized access and denial-of-service attacks with the new leading edge prevention tools.
You will examine the weaknesses of firewall architectures and how good security processes strengthen user and host-based authentication, warning banners, address translation and masquerade, remote management, alerts, content filtering, spoofing, complex protocols and other advanced issues.
Hands-on labs are designed for impact-providing you essential features of various firewall architectures including packet filters, stateful packet filting and proxy firewalls.
Main Topics
- Review of Internet Attacks
- Characteristics of the Firewall Environment
- Firewall Security Policies
- Standard (Stateless) Packet Filters
- Stateful Inspection Firewalls
- Proxy-Based Firewalls
- Proxy Servers for Internal to External Access
- Personal Firewalls
- VPN's
- Content Filtering and Prevention Tools
- Firewall Management