Udemy – Sophos UTM Advanced Course
English | Tutorial | Size: 3.44 GB
Learn Sophos UTM Today
What you’ll learn
Tests are in the Live Enviroment
Manage a firewall for a business environment.
Provide security for your personnel or business network.
Learn how to limit inside and outside accesses.
Learn how to view logs and troubleshoot.
Protects Your Business Reputation
Better Website Security
Assists in Remote Working
Improved Cyber Posture
Enhanced Data Management
Logical Access Control
Requirements
Basic Network Knowledge Would Be Enough.
Sophos UTM on VirtualBox, Vmware etc. or a Physical Sophos Firewall that UTM appliance installed.
Description
With the rise of data theft and criminals holding systems hostage, firewalls have become even more important, as they prevent hackers from gaining unauthorized access to your data, emails, systems, and more. A firewall can stop a hacker completely or deter them to choose an easier target. Unified Threat Management makes security simple Sophos UTM provides the ultimate network security package with everything you need in a single modular appliance. It simplifies your IT security without the complexity of multiple point solutions.Sophos UTM is unmatched in its deployment flexibility: choose from hardware, software, virtual or cloud with simple options for high-availability, clustering, branch office connectivity, wireless, and centralized management and reporting.Unlike antivirus tools, a UTM system does not just protect personal computers (PCs) and servers. It protects an entire network and individual users by scanning all network traffic, filtering potentially dangerous content and blocking intrusions.If you’re interested in fortifying networked systems against threats, you might be happier in network security. If you want to detect and defend against real-time cyberattacks, cybersecurity might be the better choice. Ultimately, the differences between these disciplines may be a nonissue in your career.The average salary for a firewall engineer is $106,704 per year in the United States.Learning cybersecurity can be challenging, but it doesn’t have to be difficult, especially if you’re passionate about technology. Nurture a curiosity for the technologies you’re working with, and you might find that challenging skills become easier.
Overview
Section 1: Introduction
Lecture 1 How to create your own test environment
Lecture 2 How to get a free Sophos UTM license
Lecture 3 Welcome to my course
Section 2: System Settings
Lecture 4 Organizational
Lecture 5 Hostname
Lecture 6 Time and Date
Lecture 7 Shell Access
Lecture 8 Tips & Tricks!! How to Directly Connect as a Root
Lecture 9 Reset Configuration or Passwords
Section 3: WebAdmin Settings
Lecture 10 Last Web Admin Sessions
Lecture 11 General Settings
Lecture 12 Access Control
Lecture 13 HTTPS Certificate
Lecture 14 RESTful API
Lecture 15 User Preferences
Lecture 16 Advanced Settings
Section 4: Management
Lecture 17 Licensing
Lecture 18 Firmware and Pattern Updates
Lecture 19 Backup/Restore
Lecture 20 Backup/Restore via SSH (Tips & Tricks!!)
Lecture 21 Automatic Backups
Lecture 22 Notifications
Lecture 23 Inbox Check
Lecture 24 Receiving Results
Lecture 25 Customization
Lecture 26 SNMP Query
Lecture 27 SNMP Traps
Lecture 28 Central Management
Lecture 29 High Availability
Lecture 30 Shutdown/Restart
Section 5: Definitions & Users
Lecture 31 Network, Service & Time Definitions
Lecture 32 Users & Groups
Lecture 33 Tips & Tricks!! How to log entire traffic of a user on Sophos UTM
Lecture 34 Definations Overeview
Section 6: Interfaces & Routing
Lecture 35 Interfaces
Lecture 36 Additional Addresses
Lecture 37 Nmap Tool to Detect Open Ports (Tips & Tricks!!)
Lecture 38 Uplink Monitoring
Lecture 39 IPv6
Section 7: Static Routing
Lecture 40 Interface Route
Lecture 41 Blackhole Route
Lecture 42 Policy Routes
Section 8: Quality of Service (QoS)
Lecture 43 Quality of Service (QoS) Part I
Lecture 44 Quality of Service (QoS) Part II
Lecture 45 Download Throttling
Lecture 46 Advanced Options
Section 9: Network Services
Lecture 47 DHCP Server Settings Part I
Lecture 48 DHCP Server Settings Part II
Lecture 49 NTP Services
Section 10: Firewall Rules (Network Protection)
Lecture 50 Firewall Rules Part 1
Lecture 51 Firewall Rules Part 2
Lecture 52 How to Apply Firewall Rules Between Lans
Lecture 53 Creating Rules for Lan Networks
Lecture 54 Praticing & Overwiev
Lecture 55 Country Blocking
Lecture 56 Country Blocking Exceptions
Lecture 57 ICMP Settings
Lecture 58 About Advenced
Section 11: NAT (Network Adress Translation) with Sophos UTM
Lecture 59 Masquerading
Lecture 60 SNAT & DNAT (Source NAT & Destination NAT)
Lecture 61 1:1 NAT (Whole Networks)
Lecture 62 Full NAT (Source + Destination)
Lecture 63 No NAT
Section 12: Intrusion Prevention
Lecture 64 Global IPS Setting
Lecture 65 Anti Portscan
Lecture 66 Exceptions List
Lecture 67 Advanced Settings
Section 13: Web Protection
Lecture 68 Web Filtering
Lecture 69 Web Filter Profiles
Lecture 70 Exceptions
Lecture 71 Websites
Lecture 72 Bypass Users & PUAs
Lecture 73 Categories
Lecture 74 HTTPS CAs & Misc
Lecture 75 Policy Helpdesk
Lecture 76 Application Control
Lecture 77 FTP
Lecture 78 Web Protection Statistics
Section 14: Endpoint Protection
Lecture 79 Web Control
Section 15: Webserver Protection
Lecture 80 Web Application Firewall Configuration
Lecture 81 Site Path Routing & Reverse Authentication
Lecture 82 Request Redirection
Lecture 83 Firewall Profiles
Lecture 84 Customization
Section 16: Site-to-site VPN
Lecture 85 What is the S2S VPN
Lecture 86 S2S VPN Example Topology
Lecture 87 IPsec
Lecture 88 IPSec Features
Lecture 89 Creating a SSL S2S Tunnel
Lecture 90 Establishing the Connection on SSL Tunnel & Troubleshooting
Lecture 91 Certificate Management
Lecture 92 Amazon VPC
Section 17: Remote Access
Lecture 93 The Difference Between Remote Access & Site-to-site VPN
Lecture 94 SSL
Lecture 95 HTML5 VPN Portal
Lecture 96 Advanced
Lecture 97 PPTP
Lecture 98 L2TP over IPsec
Lecture 99 IPsec VPN
Lecture 100 Certificate Management
Lecture 101 Cisco™ VPN Client
Section 18: Logging & Reporting
Lecture 102 How to View Log Files
Lecture 103 Tips & Tricks!! How to access to disk using FTP Client
Lecture 104 Hardware Logs
Lecture 105 Network Usage
Lecture 106 Remote Access
Lecture 107 Executive Report
Lecture 108 Protection Logs
Lecture 109 Log Settings
Lecture 110 Reporting Settings
Section 19: Support
Lecture 111 Support Pages
Lecture 112 Sophos UTM Password Recorvery
Section 20: Open VPN Client
Lecture 113 OpenVPN Client Configuration
Section 21: Thanks for watching my course!!
Lecture 114 Bye!!
To everyone who wants a career in Network Security environment.,Anybody who works in IT environment, should have some form of firewall & cyber security education.
1DL
1dl.net/p76q3mlmu5kp/Udemy_-_Sophos_UTM_Advanced_Course.part1.rar.html
1dl.net/3fpupr3evgc3/Udemy_-_Sophos_UTM_Advanced_Course.part2.rar.html
1dl.net/vfv0lxntle2y/Udemy_-_Sophos_UTM_Advanced_Course.part3.rar.html
1dl.net/homdevmghxql/Udemy_-_Sophos_UTM_Advanced_Course.part4.rar.html
1dl.net/vcr4e7klqqf0/Udemy_-_Sophos_UTM_Advanced_Course.part5.rar.html
1dl.net/94m39fd8dovw/Udemy_-_Sophos_UTM_Advanced_Course.part6.rar.html