Next-Generation Firewalls and Intrusion Prevention
- Offered byCoursera
Next-Generation Firewalls and Intrusion Prevention at Coursera Overview
Duration | 9 hours |
Start from | Start Now |
Total fee | Free |
Mode of learning | Online |
Official Website | Explore Free Course |
Credential | Certificate |
Next-Generation Firewalls and Intrusion Prevention at Coursera Highlights
- Earn a certificate of completion
- Add to your LinkedIn profile
Next-Generation Firewalls and Intrusion Prevention at Coursera Course details
- The dynamic landscape of network security, the mastery of advanced tools is imperative. This course is crafted to equip participants with an in-depth understanding of next-generation firewalls and intrusion prevention systems (IPS), pivotal components in contemporary network security.
Next-Generation Firewalls and Intrusion Prevention at Coursera Curriculum
Welcome Module
Welcome
Meet your Instructor
Course Syllabus
Mastering Next-Generation Firewall Basics
Exploring Firewall Evolution: From Traditional to Next-Generation
Real-World Applications of Next-Generation Firewalls
Principles of Firewall Configuration
Creating Advanced Policies
What is a Next Generation Firewall (NGFW)?
Securing the Datacenter with a Palo Alto Networks Next-Generation Firewall
Next Generation Firewalls
Introduction to Next-Generation Firewall Basics Quiz
Configuring Next-Generation Firewalls Quiz
Module 1 Exam
Firewalls
Firewall Features
Next-Generation Firewalls
Advanced Policies
Intrusion Prevention Systems: Setup and Maintenance
Defining Instrusion Prevention Systems and How Intrusion Prevention Systems Improve Your Network
Comparing Detection Methods: Signature-Based vs Anomaly-Based
Principles of Intrusion Prevention System Configuration
Creating Effective IPS Rules
Managing IPS Device Interface
Understanding Intrusion Prevention Systems Quiz
Configuring and Maintaining Intrusion Prevention Systems Quiz
Module 2 Exam
Intrusion Prevention Systems Best Practices
Intrusion Response Scenarios
Interpreting Output and Responding to Threats
Reading and Responding to Output
Identify Potential Security Risks
Effective Response to Identified Threats
Principles of Effective Network Monitoring
Developing an Ongoing Threat Response Strategy
Best Practices for Network Security Hygiene
Thank you
Requirements for Preventing Evasive Threats
Reading and Responding to Output Quiz
Ongoing Network Monitoring and Strategy Development Quiz
Module 3 Exam
Security Threats
Security Threats