contact@itlearningacademy.com LAUNCH PROMOTION: 100% off on Selected Courses

Firewall Configuration, Policies & Authentication

5.0 5 ratings Updated: Jan, 2021

What You'll Learn


  • Interface IPs
  • DNS Database and Configuration
  • Introduction of Logging and Monitoring
  • Enable Logging on Firewall Policies
  • Matching traffic to Firewall policies
  • Introduction to Network Address Translation
  • Firewall authentication
  • Firewall authentication methods

Description


Just as a firewall in a building attempts to prevent a fire from spreading, a computer firewall attempts to prevent computer viruses from spreading to your computer and to prevent unauthorized users from accessing your computer. A firewall exists between your computer and the network. It determines which services on your computer remote users on the network can access. A properly configured firewall can greatly increase the security of your system. It is recommended that you configure a firewall for any Red Hat Enterprise Linux system with an Internet connection.


Who Can Learn


  • Network administrators
  • Cyber security officers
  • Network security postgraduates
  • Network technical support specialists
  • Security incident handlers
  • IT Engineers and CEOs
  • Software Developers - Security
  • Web Developers - Security
  • Mobile Applications Developers - Security

Interface IPs

7 Lessons



Logging & Monitoring

12 Lessons



Firewall policies

7 Lessons



Introduction to Network Address Translation

8 Lessons



Firewall

8 Lessons



Excellent

5

Very Good

4

Good

3

Average

2

Poor

1

5.0

5 reviews

Zanna Khalil

01 Feb, 2021

Jazakallahu khairan

Jabir Aliyu

24 Feb, 2021

Amazing

Abdullahi Abubakar Abdullahi

10 Mar, 2021

Alhamdulillah wabini'matihi tatimmus saliheen

ABDUL-SOMED IBRAHIM

20 Mar, 2021

Alhamdulillah

Qomarudeen Lekan Oyerinde

31 Mar, 2021

Very educative

Firewall Configuration, Policies & Authentication

5.0 5 ratings Updated: Jan, 2021
firewall configuration in windows

Course price

RM299

RM29

90% Discount
Buy This Course

What You'll Learn


  • Interface IPs
  • DNS Database and Configuration
  • Introduction of Logging and Monitoring
  • Enable Logging on Firewall Policies
  • Matching traffic to Firewall policies
  • Introduction to Network Address Translation
  • Firewall authentication
  • Firewall authentication methods

Description


Just as a firewall in a building attempts to prevent a fire from spreading, a computer firewall attempts to prevent computer viruses from spreading to your computer and to prevent unauthorized users from accessing your computer. A firewall exists between your computer and the network. It determines which services on your computer remote users on the network can access. A properly configured firewall can greatly increase the security of your system. It is recommended that you configure a firewall for any Red Hat Enterprise Linux system with an Internet connection.


Who Can Learn


  • Network administrators
  • Cyber security officers
  • Network security postgraduates
  • Network technical support specialists
  • Security incident handlers
  • IT Engineers and CEOs
  • Software Developers - Security
  • Web Developers - Security
  • Mobile Applications Developers - Security

Interface IPs

7 Lessons



Logging & Monitoring

12 Lessons



Firewall policies

7 Lessons



Introduction to Network Address Translation

8 Lessons



Firewall

8 Lessons



Excellent

5

Very Good

4

Good

3

Average

2

Poor

1

5.0

5 reviews

Zanna Khalil

01 Feb, 2021

Jazakallahu khairan

Jabir Aliyu

24 Feb, 2021

Amazing

Abdullahi Abubakar Abdullahi

10 Mar, 2021

Alhamdulillah wabini'matihi tatimmus saliheen

ABDUL-SOMED IBRAHIM

20 Mar, 2021

Alhamdulillah

Qomarudeen Lekan Oyerinde

31 Mar, 2021

Very educative

Sign up to receive
the latest course updates