In the Cybersecurity Foundation course, students will learn fundamental principles associated with the current cybersecurity landscape and identify concepts required to recognize and potentially mitigate attacks against enterprise networks as well as mission critical infrastructure. Students will also learn how to initially setup and configure security zones, authentication, and policies on a next generation firewall.
• Discover modern computing trends and application threat vectors.
• Configure a network interface and test for connectivity.
• Identify cloud computing and software-as-a-service (SaaS) application challenges.
• Explore recent cyberattacks and their impact on business.
• Review attacker profiles, motivations and the Cyber-Attack Lifecycle.
• Recognize high-profile cybersecurity attacks and Advanced Persistent Threats.
• Identify malware types, vulnerabilities, exploits, spamming and phishing attacks.
• Configure and test a malware analysis security profile.
• Describe how bots and botnets are used to attack enterprise networks.
• Explore Zero Trust design principles, architecture, capabilities, and implementation.
• Review perimeter network security strategies, policies, models, and trust boundaries.
• Setup and configure inside, outside and DMZ security zones on a NGFW.
• Create and test an authentication policy on a next generation firewall.
• Review capabilities of the Security Operating Platform and components.
• Explore how to secure the enterprise with NGFW and Traps endpoint protection.
• Discover how to secure the cloud with Prisma Access, SaaS, and Cloud.
• Examine how to secure the future with Cortex Data Lake and XDR.
• Apply two-factor authentication on the next generation firewall (NGFW).
• Configure the NGFW to allow only trusted applications.
Network Security Fundamentals
In the Network Security Fundamentals course, students will gain an understanding of the fundamental tenants of network security and review the general concepts involved in maintaining a secure network computing environment. Upon successful completion of this course, students will be able to describe general network security fundamentals and implement basic network security concepts and implement bcasic network security configuration techniques.
• Identify the common enterprise network devices.
• Differentiate between routed and routing protocols.
• Recognize the various types of area networks and topologies.
• Describe the Domain Name System DNS, FQDN, and IoT.
• Recognize decimal binary, and hexadecimal conversion methods.
• Describe the structure and fields of an IP header, IPV4, and IPV6 addresses.
• Subnet an IPV4 Class C addressing scheme and configure an IP address on the firewall.
• Review the four DHCP process messages and Network Address Translation (NAT).
• Setup the firewall as a DHCP server and test the DHCP client.
• Recognize packet encapsulation and the lifecycle process.
• Identify protocols and define the OSI and TCP model layers.
• Review the transport layer protocols, ports, and packet filtering procedures.
• Create and analyze packet captures using Wireshark.
• Identify common network security encryption algorithms and key management concepts.
• Recognize symmetric/asymmetric key rotation techniques and PKI.
• Generate a Self-Signed Root Certificate Authority (CA) certificate.
• Create a decryption policy on the firewall to decrypt SSH traffic and SSL traffic.
• Describe the benefits of the next generation firewall single pass architecture.
• Identify the NGFW App-ID, User-ID, Content-ID and deployment options.
• Explore the five steps required to implement a NGFW zero-trust environment.
• Configure the NGFW to monitor, forward, and backup system logs (Syslog).