Advanced training to manage virtualized security in high-end networks and advanced security optimization techniques.
- Duration: 3 Days
•Obtain a deeper knowledge of the Security Management Architecture.
• Understand how the Security Management Server uses key processes and debugs.
• Review how objects are represented in the database.
• Understand how GuiDBedit operates.
• Understand how to use fw monitor to capture packets.
• Discuss how to enable and use core dumps when a User mode process crashes.
• Understand how to troubleshoot and debug SmartConsole issues.
• Understand how to troubleshoot and debug NAT issues using Gaia commands.
• Understand Client Side and Server Side NAT.
• Describe how to configure port mapping services.
• Recognize how to debug VPN-related issues.
• Understand how to debug HTTPS Inspection related issues.
• Understand how to troubleshoot and debug Content Awareness issues.
• Understand how to troubleshoot Anti-Bot and Antivirus issues.
• Discuss how to use IPS Bypass to manage performance issues.
• Understand how to configure IPS to reduce false positives.
• Understand how to evaluate hardware configurations for optimal performance.
• Discover additional tools to assist in monitoring CPU utilization.
• Understand how to monitor cluster status and work with critical devices.
• Recognize how to use fwaccel and sim to enable and disable accelerated traffic.
• Understand how to configure CoreXL to enhance Security Gateway performance.
• Understand how to deploy IPv6 in a local environment
Chapter 1: Advanced Database Management
Chapter 2: Kernel Mode and User Mode Troubleshooting
Chapter 3: SmartConsole and Policy Management
Chapter 4: Advanced Network Address Translation
Chapter 5: VPN Troubleshooting
Chapter 6: Troubleshooting Access Control Policies
Chapter 7: Troubleshooting Threat Prevention Policies
Chapter 8: Optimization and Tuning
Chapter 9: Advanced Clustering
Chapter 10: Acceleration Debugging
Chapter 11: IPv6
Advanced training to manage virtualized security in high-end networks and advanced security optimization techniques.
There are no reviews yet.