International Site

Security Architectures

Concepts & Solutions

A core component in the implementation of a security policy is the firewall. It is meant to protect the internal network against attacks from the Internet. The functions performed by modern firewall systems by far exceed simple filtering technologies. They often merge with the activities performed by proxies. Intrusion Prevention Systems (IPS) are designed to analyze the traffic in the network, to identify attacks, and to initiate counter-measures. The course at hand discusses the basic technologies and working methods on which firewalls and IPS are based. The implementation of these systems into an existing network and the interaction with other components are further focal points of the course.

Course Contents

 

  • Working Mode of Firewalls and IPS
  • Static Packet Filters, Access Lists
  • Dynamic Packet Filters, Stateful Firewalls
  • Personal Firewalls
  • Generic Proxies and Application Layer Gateways
  • Authentication at the Firewall, Active Directory Integration
  • Application Firewalls
  • BYOD, Devices, and Application Analysis
  • DMZ Concepts
  • High Availability and Load Sharing
  • Firewalls and Virtualization
  • Layer-2 Firewalling
  • Firewalls and IPv6
  • Intrusion Detection (IDS) vs. Intrusion Prevention (IPS)
  • IPS Technologies (HIPS, NIPS, PIPS)
  • Interaction of Firewalls and IPS

 

 Each participant will receive the comprehensive course documentation of the ExperTeach Networking series in German language. Optionally, we provide the printed version or an ExperTeach e-book.

 Detailed table of contents

 Request your tailor-made course.

Target Group

 

Network designers and project managers will learn the planning and implementation of a security solution at the perimeter. Technicians will acquire the technological know-how for the operation of firewalls and IPS, also as a basis for follow-up product training. Attendance at this course can be credited for T.I.S.P. recertification.

 

Knowledge Prerequisites

Basic know-how of the Internetworking terminology, as well as knowledge of the IP protocol are required.