TECHNICAL TRAINING ON STORMSHIELD DEVICES USED TO PROTECT THE EDGE BETWEEN THE CORPORATE NETWORK AND THE INTERNET.
REQUIREMENTS:
- basic knowledge of network configuration
- basic knowledge of TCP/IP
TRAINING BENEFITS:
This is an ideal offer not only for those who have just purchased a STORMSHIELD device but also for those who want to learn the features of the solution in practice. The training ends with an exam. If they pass, successful participants will receive a Certificate issued by the DAGMA Authorised Training Center and may obtain a STORMSHIELD CNA Certificate.
Additionally:
- you will streamline security management within your company,
- you will use the full potential of STORMSHIELD,
- you will perform network security audits,
- you will be able to diagnose and fix network issues faster,
- you will eliminate excessive overloads of company networks,
- you will reduce vulnerability.
TRAINING DURATION
21 h (3 days x 7 h)
1. BACKGROUND INFORMATION.
2. STORMSHIELD SOLUTIONS FOR PROTECTING YOUR NETWORK.
3. FIRST CONNECTION TO A STORMSHIELD DEVICE:
- Internal software (firmware)
- Management using WebGUI
- Overview of basic device configuration
- Creating a configuration backup.
- Restoring your device to factory settings
4. OBJECT CONFIGURATION:
- Role of objects in Stormshield device configuration
- Adding new objects
- Modifying and deleting unnecessary objects
- Configuring time objects
5. NETWORK CONFIGURATION:
- Interface configuration
- Routing configuration
6. CONFIGURING BASIC DEVICE SERVICES:
- DHCP server service configuration
- Proxy DNS service configuration
7. OPERATING MODES OF STORMSHIELD DEVICES
- Transparent mode (bridge)
- Advanced mode (router)
- Hybrid mode (mixed)
8. UTM PROTECTION POLICIES
- Role of firewalls in computer networks
- Overview of pre-configured slots with firewall configuration
- Configuring firewalls in Stormshield devices
- Grouping rules and checking their correctness
- Introduction to Intrusion Prevention System
- Configuring IPS in a Stormshield device
- Configuring filtering operating modes (IPS/IDS/Firewall)
9. ADDRESS TRANSLATION:
- IPv4 and IP address shortage
- Configuring NAT in Stormshield devices
10. USER MANAGEMENT:
- Introduction to user authorisations
- Configuring the LDAP server in a Stormshield device
- Integrating a Stormshield device with Microsoft Active Directory
- Temporary user accounts
11. USER AUTHORISATION:
- Introduction to user authorisation through a web browser
- Configuring the Captive Portal
- Firewall rules for authorised users
12. USE OF PROXY FOR THE MOST POPULAR SERVICES:
- How proxy works
- Configuring an HTTP proxy
- Configuring an SSL proxy
13. SCANNERS:
- Virus scanner
- URL filtering scanner
14. CONFIGURING VULNERABILITY AUDIT:
- Introduction to network audit
- Module configuration
- Overview of information collected by the scanner
15. VPN:
- Introduction to VPN
- SSL
- Client-to-site VPNs using an SSL VPN
- IPSec
- Site-to-site VPNs using IPSec
16. EVENT LOGGING:
- Configuring syslog
- Using the Real Time Monitor to monitor logs
- Activity Reports
17. ACS DAGMA EXAM.