Part I: Introduction to Security, Firewalls, DMZs, and IDSs - Introduction to security concepts, policies and firewalls
- DMZ concepts, layout, and conceptual design
- Integrating firewalls with IDSs
Part II: ISA Server - ISA server development, planning and design
- ISA server installation
- Managing ISA server
- Optimizing, customizing, integrating and backing up ISA server
- Troubleshooting ISA server
- ISA server 2000 DMZ design
- Advanced server publishing
- Protecting mail services
Part III: PIX Firewalls - Introduction to PIX firewalls
- Passing traffic
- Advanced PIX configurations
- Troubleshooting and performance monitoring
- Cisco PIX DMZ design
Part IV: Check Point NG and Nokia IP Series Appliances - Installation of Check Point NG VPN-1/Firewall-1
- Using the graphical interface
- Creating a security policy
- Configuring the Check Point firewall for Nokia
- Overview of the Nokia security platform
- Voyager web interface
- Basic Sys admin
- High availability and clustering with Check Point and Nokia
Part V: Linux and Solaris - Implementing a Linux firewall with Ipchains and Iptables
- Maintaining Linux firewalls
- Configuring Solaris as a secure router and firewall
- Solaris DMZ design
Part VI: Intrusion Detection with Snort - Introducing Snort
- Installing Snort
- Advanced Snort
|