CISCO ASA Firewall Certification Online Training | ASA Firewall Course

CISCO ASA Firewall & Cisco Firewall Network Security Training Content

Fundamentals of Firewall
How firewalls works?
How many Types of Firewalls and Classification of Firewalls

What is AAA: How Authentication, Authorization, and Accounting works
Introduction of Encryption including Single Key and PKI
What is Stateful Inspection
What is Adaptive Security Algorithm
What is Network Address Translation

Introduction of Cisco Security Appliances
Define Understanding VLANs
Understanding the Eight Basic Commands on a Cisco ASA Security Appliance & Controlling the Appliance from its Console
How to Recover Password
What are Labs
What is Password Recovery and Initial Configuration
Explaining Removing the Existing Configuration
How to use the Eight Commands Required to Enable Basic Firewall Functionality
Building an Initial Configuration on the ASA Security Appliance
Building a Base Configuration on the ASA Security Appliance

Backing Up and Restoring Configurations and Software Images
What is Labs & its features
How to Analyze the Base Configuration and Saving It
How to take the Backing Up and Restoring the Configuration and Software Image
Analyzing the Base Configuration of the Security Appliance
How to Send Logging Output to a Syslog Server
Learn Using Syslog with the Security Appliance
What is Remote Management Options
What is Remote Console Access
What is Telnet
What is SSH (Secure Shell)
What is Configuring and Managing Remote Management through ASDM
What is Talent and Secure SHELL (SSH)
How to Configuring Logo Banners, Usernames,
How to Configure a Banner
Configuring Authentication, Authorization, and Accounting (AAA)
What is Remote Authentication Technology
What is Cisco Secure Access Control Server
What is Installing and Configuring CACS
What is Authentication of Clients
How to Create Banners on the Security Appliance
How to Configure Usernames and Local Authentication
How to Configure Privilege Levels on the Security Appliance
What is Authenticating Through Windows Active Directory

Configuring the Appliance as a DHCP Server
Understanding the DHCP commands on the security appliance
What are Access-Control Lists
The importance of order of entries
The difference between standard and extended lists
Hidden implicit statements in ACLs
What is Editing ACLs
What is Re-naming ACLs
Using time-ranges with ACLs
How to use object groups with ACLs

Virtual Private Networking (VPNs)
What is PPTP
What is L2TP
What is IPSec
What is Encryption Algorithms
What is Hashing Algorithms
What is Authentication Methods
What is Troubleshooting VPN Connections
What is Configuring the Cisco AnyConnect VPN Client and Connecting to Your VPN
What is Creating a Web-Based SSL VPN
What is Site-to-Site VPNs
What is Remote Access VPNs
Configuring a Web-Based SSL VPN and Cisco AnyConnect Client
Logging Off VPN Users through the ASDM

Define DMZs (De-Militarized Zones)
Understanding DMZ concepts
What is Security Levels
What is Access Control Lists
What is Static Routes
What is Port Scanning
What is Configuring a DMZ
What is Analyzing Potential Vulnerabilities with Port Scanning
What is Filtering Content
What is Configuring Unicast RPF
What is Fragmented Packets
What is Intrusion Prevention
What is URL Filtering
What is Dynamic Content Filtering
What is Filtering Dynamic Java Content

{{ reviewsOverall }} / 5 Users (2 votes)
Rating5
What people say... Leave your rating
Order by:

Be the first to leave a review.

User Avatar User Avatar
Verified
{{{ review.rating_title }}}
{{{review.rating_comment | nl2br}}}

Show more
{{ pageNumber+1 }}
Leave your rating

Your browser does not support images upload. Please choose a modern one