Cisco ASA Firewall Training | |||
Lecture-1: Common Network Security Terms. | 00:17:00 | ||
Lecture-2: Confidentiality, Integrity, Availability. | 00:26:00 | ||
Lecture-3: Security Concepts & Terms. | 00:38:00 | ||
Lecture-4: Introduction to Firewall Technologies. | 00:28:00 | ||
Lecture-5: About Cisco ASA Firewall. | 00:12:00 | ||
Lecture-6: Install Cisco ASAv Firewall in GNS3. | 00:13:00 | ||
Lecture-6: Install Cisco ASAv Firewall in GNS3. | 00:13:00 | ||
Lecture-8: Install Cisco ASAv Firewall on EVE-NG. | 00:10:00 | ||
Lecture-9: Install Cisco ASAv Firewall on VMWare Workstation. | 00:06:00 | ||
Lecture-10: Cisco ASA Firewall Basic Configuration Commands. | 00:50:00 | ||
Lecture-11: Device Management Cisco ASA Console. | 00:10:00 | ||
Lecture-12: Device Management Cisco ASA Telnet. | 00:23:00 | ||
Lecture-13: Device Management Cisco ASA SSH. | 00:21:00 | ||
Lecture-14: Device Management Cisco ASA ASDM. | 00:32:00 | ||
Lecture-15: Device Management Cisco ASA TFTP. | 00:21:00 | ||
Lecture-16: Device Management Cisco ASA FTP. | 00:11:00 | ||
Lecture-17: Security Levels and Zoning in Cisco ASA. | 00:40:00 | ||
Lecture-18: Introduction to Routing & Static Routing. | 00:34:00 | ||
Lecture-19: Network Route Configuration in Cisco ASA. | 00:09:00 | ||
Lecture-20: Host Route Configuration in Cisco ASA. | 00:10:00 | ||
Lecture-21: Default Route Configuration in Cisco ASA. | 00:26:00 | ||
Lecture-22: Floating Static Route Configuration in ASA. | 00:37:00 | ||
Lecture-23: IP SLA (Service Level Agreement) in ASA. | 00:29:00 | ||
Lecture-24: Dynamic Routing Protocol RIP version 2. | 00:28:00 | ||
Lecture-25: Dynamic Routing Protocol EIGRP Configuration. | 00:15:00 | ||
Lecture-26: Dynamic Routing Protocol OSPF Configuration. | 00:38:00 | ||
Lecture-27: Routing Protocols Redistribution. | 00:25:00 | ||
Lecture-28: Implement Access Control Lists in ASA. | 00:36:00 | ||
Lecture-29: Configure & Verify Extended ACLs in ASA. | 01:23:00 | ||
Lecture-30: Configure & Verify Infrastructure ACLs. | 00:18:00 | ||
Lecture-31: Configure & Verify Time-Based ACLs. | 00:22:00 | ||
Lecture-32: Configure & Verify Standard ACLs. | 00:33:00 | ||
Lecture-33: Configure & Verify Object Groups ACLs. | 00:42:00 | ||
Lecture-34: Configure & Verify DHCP Server in ASA. | 00:42:00 | ||
Lecture-35: Configure & Verify DHCP Relay in ASA. | 00:16:00 | ||
Lecture-36: Introduction & Theory of NAT and PAT ASA. | 00:23:00 | ||
Lecture-37: Creating Lab Topology for NAT & PAT. | 00:25:00 | ||
Lecture-38: Static NAT in Cisco ASA. | 00:35:00 | ||
Lecture-39: Static PAT in Cisco ASA. | 00:25:00 | ||
Lecture-40: Dynamic NAT in Cisco ASA. | 00:26:00 | ||
Lecture-41: Dynamic PAT in Cisco ASA. | 00:16:00 | ||
Lecture-42: Identity NAT in Cisco ASA. | 00:23:00 | ||
Lecture-43: Policy NAT in Cisco ASA. | 00:16:00 | ||
Lecture-44: Modular Policy Framework (MPF). | 01:02:00 | ||
Lecture-45: Transparent Firewall. | 00:34:00 | ||
Lecture-46: ASDM Walk-through. | 01:17:00 | ||
Lecture-47: Security Contexts (Multi-Contexts). | 00:50:00 | ||
Lecture-48: Redundancy, HA, Active/Standby Failover. | 00:58:00 | ||
Lecture-49: Packet Capture in Cisco ASA Firewall. | 00:44:00 | ||
Lecture-50: Packet Tracer in Cisco ASA Firewall. | 00:18:00 | ||
Lecture-51: Syslog Logging in Cisco ASA Firewall. | 00:45:00 | ||
Lecture-52: Introduction and Concept of Cryptography & Terminologies. | 00:25:00 | ||
Lecture-53: Introduction & Concept of Symmetric & Asymmetric Encryption. | 00:05:00 | ||
Lecture-54: Introduction and Concept of Cryptography Hash (SHA, MD5). | 00:04:00 | ||
Lecture-55: Introduction and Concept of Virtual Private Network VPN. | 00:46:00 | ||
Lecture-56: Introduction and Concept of IPSec Protocols Features. | 00:43:00 | ||
Lecture-57: Introduction and Concept of Diffie-Hellman (DH). | 00:51:00 | ||
Lecture-58: Introduction and Concept of SSL/TLS and Handshake. | 00:34:00 | ||
Lecture-59: Introduction and Concept of IKE, Versions & Modes. | 00:21:00 | ||
Lecture-60: Internet Key Exchange IKE Phase 1 two Modes Lab. | 00:12:00 | ||
Lecture-61: Configure and Verify NAT-T (Traversal) on Routers. | 00:26:00 | ||
Lecture-62: Configure and Verify Client-Based Remote-Access VPN Lab. | 00:28:00 |
No Reviews found for this course.
Can’t find the anwser you’re looking for ? Reach out to customer support team.
There are no specific prerequisites for this course, nor are there any formal entry requirements. All you need is an internet connection, a good understanding of English and a passion for learning for this course.
You have the flexibility to access the course at any time that suits your schedule. Our courses are self-paced, allowing you to study at your own pace and convenience.
For this course, you will have access to the course materials for 1 year only. This means you can review the content as often as you like within the year, even after you've completed the course. However, if you buy Lifetime Access for the course, you will be able to access the course for a lifetime.
Yes, upon successfully completing the course, you will receive a certificate of completion. This certificate can be a valuable addition to your professional portfolio and can be shared on your various social networks.
We want you to have a positive learning experience. If you're not satisfied with the course, you can request a course transfer or refund within 14 days of the initial purchase.
Our platform provides tracking tools and progress indicators for each course. You can monitor your progress, completed lessons, and assessments through your learner dashboard for the course.
If you encounter technical issues or content-related difficulties with the course, our support team is available to assist you. You can reach out to them for prompt resolution.