For business inquiries : (+1) 438 601-1155

For special requests : (+1) 438 601-1155

A propos de la formation Stormshield

This course equips participants with tools and techniques to address issues using Stormshield Network's UTM products through the Command Line Interface (CLI). It targets personnel from companies aiming for high-level Stormshield partnerships and those aspiring to become expert support engineers or trainers. Recognized by ANSSI, this certification holds high professional value and is eligible for CPF (code 237269).

Détails
Objectifs pédagogiques de la formation Stormshield
  • Understand Stormshield Network appliance file system organization
  • Manipulate configuration and activity logging files
  • Analyze network and routing configurations
  • Perform network traffic captures
  • Analyze security policies and connections
  • Produce comprehensive information reports for diagnostics
  • Configure IPSec VPN tunnels
  • Analyze high availability configurations
  • Understand user authentication configurations
  • Analyze proxy configurations.

Qui devrait suivre cette formation Stormshield ?

Public visé par la formation Stormshield

IT Managers Network Administrators IT Technicians

Prérequis de la formation Stormshield

Valid CSNE certification and in-depth knowledge of TCP/IP and UNIX shell. Hardware requirements depend on the session format.

Formations Similaires

  • NIST CyberSecurity Framework 2.0 Détails
  • Security Manager Détails
  • COBIT 2019 Détails
  • TOGAF 9.2 Détails
  • ISO 45001 Lead Auditor Détails
  • ISO 27001 Lead Auditor Détails
  • ISO 27001 Lead Implementer Course Détails
  • ISO 45001 Lead Implementer Détails
  • ISO 27001 Lead Auditor Training Course Détails
  • ISO 27005 Training Détails
  • ISO 27002 Foundation Détails
  • Offensive Security Certified Professional (OSCP) Détails
  • EBios Détails
  • TOGAF® 10 Détails
  • ISO 22301 Lead Implementer Détails
  • Stormshield Détails
  • Configuring BIG-IP - Application Security Manager (ASM) Détails
  • ForgeRock Détails
  • Spring Security 5 Détails
  • Certified Ethical Hacker (CEH) v12 Détails
  • Implementing PowerShell Security Détails
  • Veeam Backup and Replication v12 Détails
  • KL 002.104: Kaspersky Endpoint Security and Management. Fundamentals Détails
  • LPIC-3 Exam 303: Security Détails
  • SSO (Single Sign-On) Détails
  • IT Governance Détails
  • CCSA, Check Point Certified Security Administrator R81 Détails
  • CCSE - Check Point Certified Security Expert R80.10 Détails
  • Securing Email with Cisco Email Security Appliance SESA Détails
  • Certified Ethical Hacker CEH v12 Détails
  • FCNSA Fortinet Certified Network Security Administrator Détails
  • NSE 4 FortiGate Network Security Professional Détails
  • NSE5 FortiManager 7.0 Détails
  • Securing the Web with Cisco Web Security Appliance Détails
  • Blue Coat Certified Security Analytics Administrator (BCSAA) Détails
  • CCNP Security Détails
  • Android app security Détails
  • Mastering IT Project Audit: Techniques and Best Practices Détails
  • SharePoint : Planification et administration (70-339) Détails

Déroulé de la formation Stormshield


Module 1: Introduction and Basics

Participant Introductions

Introduction to Operating System and UNIX Commands

Secure Shell (SSH) and File System Basics


Module 2: System Environment and Logs

Understanding System and User Environment

File Management and Commands

Log Management and Analysis


Module 3: Configuration Files and Backup

Exploring Configuration Files

Backup Strategies


Module 4: Network Fundamentals

Basics of Network and Routing

Configuring Network Interfaces

Routing Essentials


Module 5: Traffic Capture and Analysis

Techniques for Capturing and Analyzing Traffic

Hands-On Lab


Module 6: Advanced Security Queries (ASQ)

Introduction to ASQ

Security Policies and Filtering


Module 7: Network Address Translation (NAT) and Filtering

NAT Overview

Filtering Techniques


Module 8: Stateful Analysis and Tracking

ASQ Stateful Tracking

Connection Table Analysis


Module 9: Daemons and Processes

Understanding Daemons and Processes

Daemon Supervisor


Module 10: IPSec VPN Implementation

Basics of IPSec VPN

VPN Configuration Lab


Module 11: Public Key Infrastructure (PKI) and Certificates

Introduction to PKI and Certificates

Certificate Verification


Module 12: High Availability Configuration

High Availability Basics

Configuration and Management

Replication and Synchronization

HA Logs and Events

Formations Similaires
NIST CyberSecurity Framework 2.0 Détails
Security Manager Détails
COBIT 2019 Détails
TOGAF 9.2 Détails
ISO 45001 Lead Auditor Détails
ISO 27001 Lead Auditor Détails
ISO 27001 Lead Implementer Course Détails
ISO 45001 Lead Implementer Détails
ISO 27001 Lead Auditor Training Course Détails
ISO 27005 Training Détails
ISO 27002 Foundation Détails
Offensive Security Certified Professional (OSCP) Détails
EBios Détails
TOGAF® 10 Détails
ISO 22301 Lead Implementer Détails
Stormshield Détails
Configuring BIG-IP - Application Security Manager (ASM) Détails
ForgeRock Détails
Spring Security 5 Détails
Certified Ethical Hacker (CEH) v12 Détails
Implementing PowerShell Security Détails
Veeam Backup and Replication v12 Détails
KL 002.104: Kaspersky Endpoint Security and Management. Fundamentals Détails
LPIC-3 Exam 303: Security Détails
SSO (Single Sign-On) Détails
IT Governance Détails
CCSA, Check Point Certified Security Administrator R81 Détails
CCSE - Check Point Certified Security Expert R80.10 Détails
Securing Email with Cisco Email Security Appliance SESA Détails
Certified Ethical Hacker CEH v12 Détails
FCNSA Fortinet Certified Network Security Administrator Détails
NSE 4 FortiGate Network Security Professional Détails
NSE5 FortiManager 7.0 Détails
Securing the Web with Cisco Web Security Appliance Détails
Blue Coat Certified Security Analytics Administrator (BCSAA) Détails
CCNP Security Détails
Android app security Détails
Mastering IT Project Audit: Techniques and Best Practices Détails
SharePoint : Planification et administration (70-339) Détails

Foire Aux Questions

Stormshield is a cybersecurity company that specializes in providing comprehensive solutions to protect organizations from advanced cyber threats. They offer a range of security products and services, including network security, endpoint protection, cloud security, and industrial security.

Vous pouvez faire l’inscription ou la demande du devis avec un seul click