Overview In the realm of network security, Cisco ASA Firewall stands as a pivotal tool for protecting organizational assets from …
( 0 Reviews )
10 Students
In the realm of network security, Cisco ASA Firewall stands as a pivotal tool for protecting organizational assets from unauthorized access and cyber threats. This comprehensive course delves deep into configuring, managing, and troubleshooting Cisco ASA Firewalls. Participants will gain a solid understanding of firewall technologies, adaptive security appliance deployment, VPN configurations, and advanced security protocols. Through practical exercises and case studies, learners will develop the skills needed to secure networks effectively using Cisco ASA Firewalls.
On Completion of this online course, you’ll acquire:
This course equips participants with essential knowledge and practical skills to deploy and manage Cisco ASA Firewalls effectively. Starting with foundational concepts, participants will progress to hands-on exercises that simulate real-world scenarios. Topics include firewall configuration, access control policies, VPN setup, and intrusion prevention systems. Through interactive sessions and lab exercises, learners will gain confidence in implementing security measures to protect networks from cyber threats. Whether you’re new to network security or looking to enhance your skills, this course provides the expertise needed to safeguard organizational networks using Cisco ASA Firewalls.
This course is ideal for IT professionals, network administrators, and security specialists aiming to deepen their understanding of Cisco ASA Firewalls. It is suitable for beginners looking to enter the field of network security as well as experienced professionals seeking to upgrade their skills with hands-on Cisco ASA Firewall training.
Participants should have a basic understanding of networking concepts and familiarity with Cisco systems. Access to a computer with internet connectivity is required for accessing course materials and completing hands-on exercises. No prior experience with Cisco ASA Firewalls is necessary, as the course covers foundational to advanced topics.
Upon successful completion of the Cisco ASA Firewall Training course, learners can obtain both a PDF certificate and a Hard copy certificate for completely FREE. The Hard copy certificate is available for a nominal fee of £3.99, which covers the delivery charge within the United Kingdom. Additional delivery charges may apply for orders outside the United Kingdom.
| Cisco ASA Firewall Training Course | |||
| Lecture-1: Common Network Security Terms. | 00:17:00 | ||
| Lecture-2: Confidentiality, Integrity, Availability. | 00:26:00 | ||
| Lecture-3: Security Concepts & Terms. | 00:38:00 | ||
| Lecture-4: Introduction to Firewall Technologies. | 00:28:00 | ||
| Lecture-5: About Cisco ASA Firewall. | 00:12:00 | ||
| Lecture-6: Install Cisco ASAv Firewall in GNS3. | 00:13:00 | ||
| Lecture-7: Install ASA 9 Cluster, Security Context enable in GNS3. | 00:10:00 | ||
| Lecture-8: Install Cisco ASAv Firewall on EVE-NG. | 00:10:00 | ||
| Lecture-9: Install Cisco ASAv Firewall on VMWare Workstation. | 00:06:00 | ||
| Lecture-10: Cisco ASA Firewall Basic Configuration Commands. | 00:50:00 | ||
| Lecture-11: Device Management Cisco ASA Console. | 00:10:00 | ||
| Lecture-12: Device Management Cisco ASA Telnet. | 00:23:00 | ||
| Lecture-13: Device Management Cisco ASA SSH. | 00:21:00 | ||
| Lecture-14: Device Management Cisco ASA ASDM. | 00:32:00 | ||
| Lecture-15: Device Management Cisco ASA TFTP. | 00:21:00 | ||
| Lecture-16: Device Management Cisco ASA FTP. | 00:11:00 | ||
| Lecture-17: Security Levels and Zoning in Cisco ASA. | 00:40:00 | ||
| Lecture-18: Introduction to Routing & Static Routing. | 00:34:00 | ||
| Lecture-19: Network Route Configuration in Cisco ASA. | 00:09:00 | ||
| Lecture-20: Host Route Configuration in Cisco ASA. | 00:10:00 | ||
| Lecture-21: Default Route Configuration in Cisco ASA. | 00:26:00 | ||
| Lecture-22: Floating Static Route Configuration in ASA. | 00:37:00 | ||
| Lecture-23: IP SLA (Service Level Agreement) in ASA. | 00:29:00 | ||
| Lecture-24: Dynamic Routing Protocol RIP version 2. | 00:28:00 | ||
| Lecture-25: Dynamic Routing Protocol EIGRP Configuration. | 00:15:00 | ||
| Lecture-26: Dynamic Routing Protocol OSPF Configuration. | 00:38:00 | ||
| Lecture-27: Routing Protocols Redistribution. | 00:25:00 | ||
| Lecture-28: Implement Access Control Lists in ASA. | 00:36:00 | ||
| Lecture-29: Configure & Verify Extended ACLs in ASA. | 01:23:00 | ||
| Lecture-30: Configure & Verify Infrastructure ACLs. | 00:18:00 | ||
| Lecture-31: Configure & Verify Time-Based ACLs. | 00:22:00 | ||
| Lecture-32: Configure & Verify Standard ACLs. | 00:33:00 | ||
| Lecture-33: Configure & Verify Object Groups ACLs. | 00:42:00 | ||
| Lecture-34: Configure & Verify DHCP Server in ASA. | 00:42:00 | ||
| Lecture-35: Configure & Verify DHCP Relay in ASA. | 00:16:00 | ||
| Lecture-36: Introduction & Theory of NAT and PAT ASA. | 00:23:00 | ||
| Lecture-37: Creating Lab Topology for NAT & PAT. | 00:25:00 | ||
| Lecture-38: Static NAT in Cisco ASA. | 00:35:00 | ||
| Lecture-39: Static PAT in Cisco ASA. | 00:25:00 | ||
| Lecture-40: Dynamic NAT in Cisco ASA. | 00:26:00 | ||
| Lecture-41: Dynamic PAT in Cisco ASA. | 00:16:00 | ||
| Lecture-42: Identity NAT in Cisco ASA. | 00:23:00 | ||
| Lecture-43: Policy NAT in Cisco ASA. | 00:16:00 | ||
| Lecture-44: Modular Policy Framework (MPF). | 01:02:00 | ||
| Lecture-45: Transparent Firewall. | 00:34:00 | ||
| Lecture-46: ASDM Walk-through. | 01:17:00 | ||
| Lecture-47: Security Contexts (Multi-Contexts). | 00:49:00 | ||
| Lecture-48: Redundancy, HA, Active/Standby Failover. | 00:58:00 | ||
| Lecture-49: Packet Capture in Cisco ASA Firewall. | 00:44:00 | ||
| Lecture-50: Packet Tracer in Cisco ASA Firewall. | 00:18:00 | ||
| Lecture-51: Syslog Logging in Cisco ASA Firewall. | 00:45:00 | ||
| Lecture-52: Introduction and Concept of Cryptography & Terminologies. | 00:25:00 | ||
| Lecture-53: Introduction & Concept of Symmetric & Asymmetric Encryption. | 00:05:00 | ||
| Lecture-54: Introduction and Concept of Cryptography Hash (SHA, MD5). | 00:04:00 | ||
| Lecture-55: Introduction and Concept of Virtual Private Network VPN. | 00:46:00 | ||
| Lecture-56: Introduction and Concept of IPSec Protocols Features. | 00:43:00 | ||
| Lecture-57: Introduction and Concept of Diffie-Hellman (DH). | 00:51:00 | ||
| Lecture-58: Introduction and Concept of SSL/TLS and Handshake. | 00:34:00 | ||
| Lecture-59: Introduction and Concept of IKE, Versions & Modes. | 00:21:00 | ||
| Lecture-60: Internet Key Exchange IKE Phase 1 two Modes Lab. | 00:12:00 | ||
| Lecture-61: Configure and Verify NAT-T (Traversal) on Routers. | 00:26:00 | ||
| Lecture-62: Configure and Verify Client-Based Remote-Access VPN Lab. | 00:28:00 | ||
In the UK, the social care system is mainly managed by the local councils. People are directly employed by the councils. They often work together with the health commissioners under joint funding arrangements. Some people work for private companies or voluntary organizations hired by local councils. They help the local councils with their personal social services.
In the UK, the social care system is mainly managed by the local councils. People are directly employed by the councils. They often work together with the health commissioners under joint funding arrangements. Some people work for private companies or voluntary organizations hired by local councils. They help the local councils with their personal social services.
In the UK, the social care system is mainly managed by the local councils. People are directly employed by the councils. They often work together with the health commissioners under joint funding arrangements. Some people work for private companies or voluntary organizations hired by local councils. They help the local councils with their personal social services.
In the UK, the social care system is mainly managed by the local councils. People are directly employed by the councils. They often work together with the health commissioners under joint funding arrangements. Some people work for private companies or voluntary organizations hired by local councils. They help the local councils with their personal social services.
In the UK, the social care system is mainly managed by the local councils. People are directly employed by the councils. They often work together with the health commissioners under joint funding arrangements. Some people work for private companies or voluntary organizations hired by local councils. They help the local councils with their personal social services.
14-Day Money-Back Guarantee
COPYRIGHT © 2021 One Education
Oops! We could not locate your form.