course overview
DESCRIPTION
Course OverviewTRANSCRIPT
Company
LOGO Course Overview - NSA
Network Security Associate
Agenda
1. About us – Troika System
2. Courses Offered
3. Elements of Network & Security Program
4. Benefits
Troika Systems
5. Why Troika Systems
5. Placements
Troika System
Troika Systems
Headquarter in Delhi, Troika system provides technical consultancy, and
Hands-on training on Network and security technologies i.e. Firewalls, IPS,
Mail security Gateways, Network Access control (NAC), Two Factor
Authentication, Application load balancers , SSL VPN etc. -- Core elements of
any datacenter design.
Candidates gains competitive and monetary advantage by leveraging our
highly customized world class trainings on affordable cost.
Contd..
Troika Systems
Troika system was founded in year 2010 and started knowledge sharing program
with *Checkpoint* firewall hands-on trainings with one student only.
Objective was to help out the professionals and fresher's seeking to pursue their
carrier in Network Security field.
50+ students were trained in time span of just 1 year and 90% of the students are
well settled and working with industry giants i.e. TechM, TCS, HCL Comnet,
Orange, IBM etc.. and are earning good.
Courses Offered
Basics of network and security
Cisco certified network associate (CCNA)
CCNA Security
Cisco Firewall ASA – Foundation and advance
Cisco CCSP – Security professional
Cisco ASA Foundation
Cisco IPS
Cisco ASA advance
Cisco IOS firewall & VPN
Juniper – JNCIA & JNCIS
Checkpoint CCSA and CCSE
Troika Systems
Contd..
Troika Systems
Troika NSA – Network Security Associate
Troika NSP – Network Security Professional
Troika NSE – Network Security Expert
Element OF NSA Program
Network Security Associate
Basics of
Network
Security
Firewalls
Basics
Troika Systems
VPN
IPSec LABS
NSA (network Security Associate) Program is the entry, fundamental level of certification
course that validates a candidate's ability to configure and manage fundamental
implementations of Check Point's and Juniper flagship product, FireWall-1, as an enterprise
level Internet security solution to protect corporate networks.
NSA – Basics of Network and Security
Introduction to Network security
Why network security?
Attribute of network Security
– Confidentiality
– Integrity
– Availability
Types of network and application
based threats
– IP spoofing, DOS, DDOS etc..
– Virus, worms, phishing attack,
pharming, SQL injection, ARP
poisoning, DNS poisoning etc.
Advance TCP/IP concepts
– Three Way Handshake
– TCP Flags
– Flow control
– Windowing
Layered Security Architecture
– Perimeter layer defense
– Gateway layer defense
– Server / Desktop layer defense
– Application layer defense
Overview of Security Controls
– Firewalls & UTM’s
– Intrusion prevention /. Detection
systems
– IPsec and SSL VPN’s\
– Forward , reverse and transparent
proxies
– Load balancers
– Web & mail Security gateways
– Two Factor authentication
Troika Systems
NSA – Firewalls (Checkpoint & Juniper)
Overview of Firewall technology
Firewall technologies
– Packet Filter Firewalls
– Application gateways / Proxy
– Statefull Firewalls
Overview of FTP protocol
– Active & Passive FTP
– Firewall technologies comparison.
Overview on Checkpoint firewall
Checkpoint Three tier architecture
– Security Gateway
– Security Management
– Smart Console / GUI clients
Understanding of SIC (Secure
internal communication)
Detailed packet flow
Deployment scenarios
– Standalone deployment
– Distributed deployment
Licensing Overview
– Local Licenses
– Central Licenses
Firewall Security policy & Rule
base
– Access control policy
– Address translation policy
– Implicit and explicit policy types
Network Address Translation– Static NAT
– HIDE NAT / PAT
– Policy based NAT
– No NAT
Troika Systems
NSA – Firewalls (Checkpoint & Juniper).
Overview of Juniper firewall
Technology
ScreenOS Concepts i.e. Zones,
interfaces, virtual routers etc.
Packet flow in Screen OS
Deployment modes– Transparent mode
– Route mode
– NAT mode
Network Address Translation – VIP
– MIP
– DIP
Overview of Advance screen
options
Security policy and policy based
routing
Authentication overview
– in band authentication i.e. Local
DB
– Out band authentication i.e.
– AD/LDAP integration
Backup and restore controls
SPLAT Overview
– Common commands
– Security Gateway CLI controls
– Useful commands
Overview of IPS and Security
policies
Overview of Web and mail
security software blade
Troika Systems
NSA – VPN Basics.
Overview of VPN Technology
IPsec Protocols
ESP Tunnel & transport mode
AH Tunnel & transport mode
IKE protocol
– IKE Phase 1
• Main Mode
• Aggressive Mode
– IKE Phase-2 / IPsec Phase
• Quick Mode
IPSec VPN topologies
– Gateway to gateway
– Client to gateway
IKE and IPSec SA (security
associations)
Policy and route based VPN in
Juniper
Troika Systems
Labs
Checkpoint Firewall
Lab 1: Distributed Installation
Lab 2: Security Gateway and security management Installation
Lab 3: Defining Basic Objects
Lab 4: Configure DMZ
Lab 5: Configure NAT (Static, Hide/PAT)
Lab 6: Monitoring with SmartView Tracker
Lab 7: Smart View monitor & Smart update
Lab 8: User/Client Authentication
Lab 9: Configure a Site-to-Site VPN
Lab 10: Remote Access and Office Mode
Lab 11: Messaging and Content Security
Juniper Firewall
Lab1: Initial configuration
Lab2: Configure Device Administration
Lab3:Layer 3 operations
Lab4:Configure Basic Policy Configuration
Lab5:Advanced policy options
Lab6: Configure Network address Translation
Lab7: Configure device in Transparent mode
Lab8:Configure Policy based and Route based VPN’s
Troika Systems
Element OF NSP Program
Network Security Professional
Basics of
Network
Security
Firewalls
Advance
Troika Systems
VPN
Advance
IPSec
LABS
&
Tshoot
NSP (network Security Professional) Program is *advance* level of training course that
validates a candidate's ability to configure and manage fundamental implementations of
Check Point's and Juniper flagship product, FireWall-1, as an enterprise level Internet
security solution to protect corporate networks.
NSA – Firewalls (Checkpoint & Juniper)
Overview of Firewall technology
Firewall technologies
– Packet Filter Firewalls
– Application gateways / Proxy
– Statefull Firewalls .
Checkpoint Three tier architecture
– Security Gateway
– Security Management
– Smart Console / GUI clients
Understanding of SIC (Secure
internal communication)
Detailed packet flow
Deployment scenarios
– Standalone deployment
– Distributed deployment
Licensing Overview
– Local Licenses
– Central Licenses
Firewall Security policy & Rule
base
– Access control policy
– Address translation policy
– Implicit and explicit policy types
Network Address Translation– Static NAT
– HIDE NAT / PAT
– Policy based NAT
– No NAT
Troika Systems
Benefits
This training can give a specialty edge and superior market position.
It will improve your motivational effectiveness with your peers and
speak with authority, build confidence and become a center of
excellence
It confirms that you made the right career choice in networking vs.
something else, in contrast if it's impossible to pass then rethink
your career.
Accommodate global needs and academic cycles.
Better career opportunities.
Troika Systems
Why Troika ?
Troika Systems
Highly Qualified and experienced faculty with Strong theoretical as well as
practical knowledge
Knowledge sharing on real time problems and simulation in state-of-Art lab..
inline with students requirements and certainly provide unique offerings in
training industry
Job Assistance for both fresher as well as professional.
Customized course material with more emphasis on troubleshooting tools
and various scenarios.
Guidance and assistance to crack interviews.
24*7 Lab facility
Placements
Troika Systems
Thank You…..
If your future or passion is in network and security
technology this is the very foundation that most
organizations are looking for...
Troika Systems